International Conference on Advances in Computing and Information Technology最新文献

筛选
英文 中文
Traffic Light Synchronization 红绿灯同步
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31552-7_11
K. S. Nayaki, N. Krishnan, Vivek Joby, R. Sreelakshmi
{"title":"Traffic Light Synchronization","authors":"K. S. Nayaki, N. Krishnan, Vivek Joby, R. Sreelakshmi","doi":"10.1007/978-3-642-31552-7_11","DOIUrl":"https://doi.org/10.1007/978-3-642-31552-7_11","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"731 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115062598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN SRSnF: DTN喷雾与聚焦路由协议中的安全路由策略
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31513-8_17
Sujoy Saha, Rohit Verma, Satadal Sengupta, Vineet Mishra, S. Nandi
{"title":"SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN","authors":"Sujoy Saha, Rohit Verma, Satadal Sengupta, Vineet Mishra, S. Nandi","doi":"10.1007/978-3-642-31513-8_17","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_17","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117157616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor Networks 一种新的无线传感器网络安全信息交换功率均衡加密方案
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31513-8_27
Shanta Mandal, R. Chaki
{"title":"A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor Networks","authors":"Shanta Mandal, R. Chaki","doi":"10.1007/978-3-642-31513-8_27","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_27","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116327727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A VLSI Architecture for Wavelet Based Image Compression 基于小波图像压缩的VLSI结构
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31600-5_59
J. U. Kidav, P. A. Ajeesh, Drisya Vasudev, V. S. Deepak, A. Menon
{"title":"A VLSI Architecture for Wavelet Based Image Compression","authors":"J. U. Kidav, P. A. Ajeesh, Drisya Vasudev, V. S. Deepak, A. Menon","doi":"10.1007/978-3-642-31600-5_59","DOIUrl":"https://doi.org/10.1007/978-3-642-31600-5_59","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122161988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimum Sub-station Positioning Using Hierarchial Clustering 基于分层聚类的最优分站定位
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31552-7_42
Shabbir Uddin, S. Chakravorty, A. Ray
{"title":"Optimum Sub-station Positioning Using Hierarchial Clustering","authors":"Shabbir Uddin, S. Chakravorty, A. Ray","doi":"10.1007/978-3-642-31552-7_42","DOIUrl":"https://doi.org/10.1007/978-3-642-31552-7_42","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124650765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SEPastry: Security Enhanced Pastry SEPastry:安全增强糕点
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31513-8_80
Madhumita Mishra, S. Tripathy, Sathya Peri
{"title":"SEPastry: Security Enhanced Pastry","authors":"Madhumita Mishra, S. Tripathy, Sathya Peri","doi":"10.1007/978-3-642-31513-8_80","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_80","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125070042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secured Ontology Matching Using Graph Matching 使用图匹配的安全本体匹配
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31552-7_2
K. Shenoy, K. Shet, U. D. Acharya
{"title":"Secured Ontology Matching Using Graph Matching","authors":"K. Shenoy, K. Shet, U. D. Acharya","doi":"10.1007/978-3-642-31552-7_2","DOIUrl":"https://doi.org/10.1007/978-3-642-31552-7_2","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Visualization Tool for Analyzing the Design of Physical and Network Layers Parameters of a Wireless Network 用于分析无线网络物理层和网络层参数设计的可视化工具
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31600-5_29
J. Araújo, J. Rodrigues, S. Fraiha, H. Gomes, N. Vijaykumar, G. Cavalcante, C. Francês
{"title":"A Visualization Tool for Analyzing the Design of Physical and Network Layers Parameters of a Wireless Network","authors":"J. Araújo, J. Rodrigues, S. Fraiha, H. Gomes, N. Vijaykumar, G. Cavalcante, C. Francês","doi":"10.1007/978-3-642-31600-5_29","DOIUrl":"https://doi.org/10.1007/978-3-642-31600-5_29","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127924150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT) 基于小波变换(IAWT)的歌曲信号秘密图像嵌入认证
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31513-8_20
U. K. Mondal, J. K. Mandal
{"title":"Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT)","authors":"U. K. Mondal, J. K. Mandal","doi":"10.1007/978-3-642-31513-8_20","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_20","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123280448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MSRCC - Mitigation of Security Risks in Cloud Computing MSRCC—减轻云计算中的安全风险
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31513-8_54
D. Chandramohan, T. Vengattaraman, M. S. Basha, D. Ponnurangam
{"title":"MSRCC - Mitigation of Security Risks in Cloud Computing","authors":"D. Chandramohan, T. Vengattaraman, M. S. Basha, D. Ponnurangam","doi":"10.1007/978-3-642-31513-8_54","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_54","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126547762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信