Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Energy conservation in WSN: A review of current techniques
WSN is defined as the group of sensor nodes which has the ability to sense various
environmental parameters. It has limitation in ranges. The sensor nodes present in the …
environmental parameters. It has limitation in ranges. The sensor nodes present in the …
Evolution of quantum cryptography in response to the computational power of quantum computers: an archival view
Quantum cryptography (QC), rooted in the principles of quantum mechanics, stands as a
beacon of security, offering an unparalleled level of protection against quantum attacks. This …
beacon of security, offering an unparalleled level of protection against quantum attacks. This …
Quantum resilience and distributed trust: The promise of blockchain and quantum computing in defense
S Akhai, V Kumar - … Security Practices Using Blockchain, Quantum and …, 2024 - Springer
The combination of blockchain technology with quantum computing has opened up new
doors for improving the safety and effectiveness of a diverse variety of business sectors. The …
doors for improving the safety and effectiveness of a diverse variety of business sectors. The …
[HTML][HTML] Mutual authentication of nodes using session token with fingerprint and MAC address validation
Security has become an important issue during communication among mobile nodes in an
unfavorable condition. The mobile node's property is dynamic, so it isn't easy to manage …
unfavorable condition. The mobile node's property is dynamic, so it isn't easy to manage …
Detection and classification of Covid-19 in CT-lungs screening using machine learning techniques
In this study, machine learning is used to detect coronavirus in CT-lung screening. This virus
causes serious acute respiratory illness and is very contagious. The WHO has confirmed 19 …
causes serious acute respiratory illness and is very contagious. The WHO has confirmed 19 …
Multi-class SVM based network intrusion detection with attribute selection using infinite feature selection technique
An intrusion detection mechanism is a software program or a device that monitors the
network and provides information about any suspicious activity. This paper proposes a multi …
network and provides information about any suspicious activity. This paper proposes a multi …
Multiple watermarking scheme for video & image for authentication & copyright protection
Watermarking has been used frequently to authenticate the accuracy and security of the
image and video files. In the world of computer technology, several watermarking strategies …
image and video files. In the world of computer technology, several watermarking strategies …
A secure and efficient data migration over cloud computing
Migrations are complex and depend on the project and its requirements, so security is
essential to ensure a safe migration to the cloud. There are many things to consider, such as …
essential to ensure a safe migration to the cloud. There are many things to consider, such as …
A fuzzy ISM analysis of factors in growth of initial coin offerings (ICOs)
In the previous few years, the value of cryptocurrencies and their market capitalization have
grown at an incredibly rapid pace. There are currently over 1500 distinct trading currencies …
grown at an incredibly rapid pace. There are currently over 1500 distinct trading currencies …
Retracted: Performance study of snort and suricata for intrusion detection system
As of late, move to multitasking processors and thus applications using multithreaded
structure has increased in an abrupt manner. There is a constant thought of using Network …
structure has increased in an abrupt manner. There is a constant thought of using Network …