Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An energy efficient encryption technique for the Internet of Things sensor nodes
Securing data at the back end in Internet of Things (IoT) applications, such as a cloud server,
is easy due to the ample computational resources at that stage. However, securing the data …
is easy due to the ample computational resources at that stage. However, securing the data …
Enhancing SDN resilience against DDoS attacks through dynamic virtual controller deployment and attack level detection algorithm
RJ Anandhi - International Journal of Information Technology, 2024 - Springer
The rapid evolution of network traffic created various problems in detecting Distributed
Denial of Service (DDOS) attacks. The manifestation of Software Defined Networking (SDN) …
Denial of Service (DDOS) attacks. The manifestation of Software Defined Networking (SDN) …
Evaluation of a 3-DOF helicopter dynamic control model using FOPID controller-based three optimization algorithms
This paper discusses the performance comparison of three advanced AI methodologies,
namely: Harris Hawks Optimization (HHO), Hybrid Sperm Swarm Optimization Gravitational …
namely: Harris Hawks Optimization (HHO), Hybrid Sperm Swarm Optimization Gravitational …
Audio verification in forensic investigation using light deep neural network
ND AL-Shakarchy, ZN Abdullah, ZM Alameen… - International Journal of …, 2024 - Springer
Recently people have difficulties distinguishing real speech from computer-generated
speech so that the synthetic voice is getting closer to a natural-sounding voice, due to the …
speech so that the synthetic voice is getting closer to a natural-sounding voice, due to the …
ZeroMedChain: Layer 2 security and zero-knowledge proof integration for decentralized identity and access management in healthcare
With the rise of healthcare digitization, it has become a critical priority to safeguard patient
privacy and ensure data security. Conventional methods of data access control mechanisms …
privacy and ensure data security. Conventional methods of data access control mechanisms …
Improving dependability with low power fault detection model for skinny-hash
S Arvind Barge, GI Mary - PloS one, 2024 - journals.plos.org
The increasing popularity and prevalence of Internet of Things (IoT) applications have led to
the widespread use of IoT devices. These devices gather information from their environment …
the widespread use of IoT devices. These devices gather information from their environment …
Optimized quantum circuit implementation of SATURNIN for Grover's algorithm
SN Allu, TA Naidu, KG Rao - International Journal of Information …, 2024 - Springer
In 2019, SATURNIN a light-weighted block cipher was proposed for post-quantum security.
In this research, we try to examine the security strength of SATURNIN by implementing its …
In this research, we try to examine the security strength of SATURNIN by implementing its …
Evaluation of optimization algorithms for power and voltage in solar power generation system: FOPID controller and MPPT-based P&O algorithm
In this work, the study gives attention for improvement of the Maximum Power Point Tracking
(MPPT) using the Perturb and Observe (P&O) algorithm based MPPT applied to solar power …
(MPPT) using the Perturb and Observe (P&O) algorithm based MPPT applied to solar power …
Novel hardware architectures of improved-LEA lightweight cipher for IoT applications
Abstract The Internet of Things (IoTs), smart cards, and other ubiquitous computing devices
have grown exponentially since last decade. These devices demand new security and …
have grown exponentially since last decade. These devices demand new security and …
Quantum resource estimation of PRINCE and Midori Block Ciphers
With the continuous advancement of quantum technologies, the estimation of quantum
resources necessary for quantum tasks becomes extremely important for optimization …
resources necessary for quantum tasks becomes extremely important for optimization …