Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An enhanced quantum key distribution protocol for security authentication
Quantum Cryptography is revolutionary discovery in the field of network security. Quantum
cryptography promises to provide sophisticated functionality for security issues but it also …
cryptography promises to provide sophisticated functionality for security issues but it also …
An improved quantum key distribution protocol for verification
Facts say that practical cryptographic systems are now within the range. Quantum
cryptography generally gives the solution which uses the various methods of polarization to …
cryptography generally gives the solution which uses the various methods of polarization to …
An enhanced energy efficient routing protocol for VANET using special cross over in genetic algorithm
Wireless networks are gaining popularity now a days. A Vehicular Ad-hoc network that is
able to configure all network devices, which means all devices work as host and as a router …
able to configure all network devices, which means all devices work as host and as a router …
Design and development of new framework for detection and mitigation of wormhole and black hole attacks in VANET
VANET is the future of network technology. Due to its characteristics it does possess threats
and one of those threats is its safety. The issues of safety in VANET are discussed several …
and one of those threats is its safety. The issues of safety in VANET are discussed several …
An enhanced 4-way technique using cookies for robust authentication process in wireless network
Abstract In Wireless Local Area Network (WLAN) IEEE802. 11, during the connection
establishment four way handshake approaches is used for authentication. 4-way handshake …
establishment four way handshake approaches is used for authentication. 4-way handshake …
COVID-19 pandemic & cyber security issues: Sentiment analysis and topic modeling approach
The purpose of this study is to understand public awareness of cybersecurity-related issues
and discussions during the COVID-19 pandemic. Employees and confidential organizational …
and discussions during the COVID-19 pandemic. Employees and confidential organizational …
Multiple watermarking scheme for video & image for authentication & copyright protection
Watermarking has been used frequently to authenticate the accuracy and security of the
image and video files. In the world of computer technology, several watermarking strategies …
image and video files. In the world of computer technology, several watermarking strategies …
A fuzzy logic-based control system for detection and mitigation of blackhole attack in vehicular ad hoc network
Vehicular ad hoc network enables the vehicle in the network to establish a connection when
they required to communicate with the other vehicle in the network. These networks are the …
they required to communicate with the other vehicle in the network. These networks are the …
A neural network-based approach for pest detection and control in modern agriculture using internet of things
The networks acquire an altered move towards the difficulty solving skills rather than that of
conventional computers. Artificial neural networks are comparatively crude electronic …
conventional computers. Artificial neural networks are comparatively crude electronic …
Weather forecasting using parallel and distributed analytics approaches on big data clouds
In cloud environment, big data analytics is a very innovative idea; in this paper we have
design architecture for parallel and distributed analysis of big data in cloud environment. We …
design architecture for parallel and distributed analysis of big data in cloud environment. We …