Energy conservation in WSN: A review of current techniques
WSN is defined as the group of sensor nodes which has the ability to sense various
environmental parameters. It has limitation in ranges. The sensor nodes present in the …
environmental parameters. It has limitation in ranges. The sensor nodes present in the …
Detection and classification of Covid-19 in CT-lungs screening using machine learning techniques
In this study, machine learning is used to detect coronavirus in CT-lung screening. This virus
causes serious acute respiratory illness and is very contagious. The WHO has confirmed 19 …
causes serious acute respiratory illness and is very contagious. The WHO has confirmed 19 …
[HTML][HTML] Mutual authentication of nodes using session token with fingerprint and MAC address validation
Security has become an important issue during communication among mobile nodes in an
unfavorable condition. The mobile node's property is dynamic, so it isn't easy to manage …
unfavorable condition. The mobile node's property is dynamic, so it isn't easy to manage …
Multi-class SVM based network intrusion detection with attribute selection using infinite feature selection technique
An intrusion detection mechanism is a software program or a device that monitors the
network and provides information about any suspicious activity. This paper proposes a multi …
network and provides information about any suspicious activity. This paper proposes a multi …
Evolution of Quantum Cryptography in Response to the Computational Power of Quantum Computers: An Archival View
Quantum cryptography (QC), rooted in the principles of quantum mechanics, stands as a
beacon of security, offering an unparalleled level of protection against quantum attacks. This …
beacon of security, offering an unparalleled level of protection against quantum attacks. This …
Multiple watermarking scheme for video & image for authentication & copyright protection
Watermarking has been used frequently to authenticate the accuracy and security of the
image and video files. In the world of computer technology, several watermarking strategies …
image and video files. In the world of computer technology, several watermarking strategies …
An automated optimize utilization of water and crop monitoring in agriculture using IoT
Agriculture is the primary occupation in our country for ages. But now due to migration of
people from rural to urban there is hindrance in agriculture. So, to overcome this problem we …
people from rural to urban there is hindrance in agriculture. So, to overcome this problem we …
RETRACTED: Performance Study of Snort and Suricata for Intrusion Detection System
As of late, move to multitasking processors and thus applications using multithreaded
structure has increased in an abrupt manner. There is a constant thought of using Network …
structure has increased in an abrupt manner. There is a constant thought of using Network …
Quantum Resilience and Distributed Trust: The Promise of Blockchain and Quantum Computing in Defense
S Akhai, V Kumar - … Security Practices Using Blockchain, Quantum and …, 2024 - Springer
The combination of blockchain technology with quantum computing has opened up new
doors for improving the safety and effectiveness of a diverse variety of business sectors. The …
doors for improving the safety and effectiveness of a diverse variety of business sectors. The …
End-to-end authentication based secure communication in vehicular ad hoc networks (VANET)
Wireless channels are used to link vehicles in a VANET. In these networks, there is no fixed
or static base station or any other kind of infrastructure support. An ad hoc network for mobile …
or static base station or any other kind of infrastructure support. An ad hoc network for mobile …