首页 > 最新文献

International Journal of communication and computer Technologies最新文献

英文 中文
Secure Data Transmission In AODV Routing Protocol  AODV路由协议中的安全数据传输
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/01.02.09
K. Srivastava, Avinash Tripathi, Anjnesh Kumar Tiwari
Secure Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as adhoc networks. A Mobile adhoc network (MANET) is multi-hop, mobile, infrastructure less wireless network which is capable of independent operation. In this paper we have been discussing some of the basic routing protocols in MANET like Destination Sequenced Distance Vector(DSDV), Dynamic Source Routing(DSR), Adhoc On Demand Distance Vector(AODV) and Zone Routing Protocol(ZRP). Security is one of the principal issue in MANETs as they are infrastructure-less and independent. Therefore, in manet having security needs, there must be two considerations kept in mind: one to make a data transmission. Our endeavour in this paper would focus on achieving the routing and secure data exchange. In this course, we have designed the Ad Hoc on Demand Routing Protocol (AODV) using asymmetric cryptographic algorithm such as RSA . Which is more efficient as well as we have implemented the security technique so that we can prevent the data loss at the time of transmission. KeywordsAdhoc network, key management, mobile adhoc network, routing protocol, security.
在没有任何基础设施支持的移动和无线节点网络中进行信息交换,这种网络称为自组织网络。移动自组网(MANET)是一种能够独立运行的多跳、移动、无基础设施的无线网络。本文讨论了MANET中的一些基本路由协议,如目的地顺序距离矢量(DSDV)、动态源路由(DSR)、随需应变距离矢量(AODV)和区域路由协议(ZRP)。安全是manet的主要问题之一,因为它们是无基础设施和独立的。因此,在有安全需求的市场中,必须牢记两点:一是进行数据传输。本文的工作重点是实现路由和安全数据交换。在本课程中,我们使用非对称加密算法(如RSA)设计了Ad Hoc随需应变路由协议(AODV)。这是更有效率的,而且我们已经实施了安全技术,这样我们就可以防止数据在传输时丢失。关键词:自组网;密钥管理;移动自组网;
{"title":"Secure Data Transmission In AODV Routing Protocol ","authors":"K. Srivastava, Avinash Tripathi, Anjnesh Kumar Tiwari","doi":"10.31838/ijccts/01.02.09","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.09","url":null,"abstract":"Secure Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as adhoc networks. A Mobile adhoc network (MANET) is multi-hop, mobile, infrastructure less wireless network which is capable of independent operation. In this paper we have been discussing some of the basic routing protocols in MANET like Destination Sequenced Distance Vector(DSDV), Dynamic Source Routing(DSR), Adhoc On Demand Distance Vector(AODV) and Zone Routing Protocol(ZRP). Security is one of the principal issue in MANETs as they are infrastructure-less and independent. Therefore, in manet having security needs, there must be two considerations kept in mind: one to make a data transmission. Our endeavour in this paper would focus on achieving the routing and secure data exchange. In this course, we have designed the Ad Hoc on Demand Routing Protocol (AODV) using asymmetric cryptographic algorithm such as RSA . Which is more efficient as well as we have implemented the security technique so that we can prevent the data loss at the time of transmission. KeywordsAdhoc network, key management, mobile adhoc network, routing protocol, security.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128531141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smart LPG Monitoring and Controlling System  智能LPG监控系统
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/05.01.05
Gowshika
LPG is used all over the world even in villages. Because of its versatile nature it is used as a fuel for domestic, industrial, automobile and other purposes. But its security has become a major issue. Constant vigilance is required for the LPG and is done by using Internet of Things (IOT). This design of wireless LPG monitoring system is proposed for home safety. This system detects the status of the regulator and sends notification to the consumer through Wi-Fi module. The user can also switch OFF the LPG regulator if necessary through the android app from any place using the mobile phone. The additional advantage of the system is that it automatically switches off the LPG regulator at the time set by the consumer around. This system ensures safety and prevents explosion due to unnecessary open of regulator. The system is real time, economical, commercial and cost efficient.
液化石油气在世界各地使用,甚至在村庄。由于它的多用途性质,它被用作家庭、工业、汽车和其他用途的燃料。但它的安全已成为一个主要问题。液化石油气需要持续保持警惕,并通过物联网(IOT)来完成。针对家庭安全问题,提出了无线LPG监控系统的设计方案。该系统检测调节器的状态,并通过Wi-Fi模块向消费者发送通知。如果需要,用户也可以在任何地方使用手机通过安卓应用程序关闭液化石油气调节器。该系统的另一个优点是,它可以在用户设定的时间自动关闭LPG调节器。该系统确保安全,防止因不必要的调节器打开而发生爆炸。该系统具有实时性、经济性、商业性和成本效益等特点。
{"title":"Smart LPG Monitoring and Controlling System ","authors":"Gowshika","doi":"10.31838/ijccts/05.01.05","DOIUrl":"https://doi.org/10.31838/ijccts/05.01.05","url":null,"abstract":"LPG is used all over the world even in villages. Because of its versatile nature it is used as a fuel for domestic, industrial, automobile and other purposes. But its security has become a major issue. Constant vigilance is required for the LPG and is done by using Internet of Things (IOT). This design of wireless LPG monitoring system is proposed for home safety. This system detects the status of the regulator and sends notification to the consumer through Wi-Fi module. The user can also switch OFF the LPG regulator if necessary through the android app from any place using the mobile phone. The additional advantage of the system is that it automatically switches off the LPG regulator at the time set by the consumer around. This system ensures safety and prevents explosion due to unnecessary open of regulator. The system is real time, economical, commercial and cost efficient.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125913933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Monitoring and Control of Component Transfer and Packing through Conveyors Using PLC, SCADA and Mobile Application 利用PLC, SCADA和移动应用程序监控和控制通过输送机的组件转移和包装
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/07.sp01.09
S. Jegandiravianath, A. Ajith, S. DharaniramT, M. Gokulnath, T. Balaji
The main objective of the project is to monitor and control the components that are being carried over the belt conveyers using PLC, SCADA and Android Mobile Application. The conveyer is controlled through the PLC programming for its control processes. SCADA and MOBILE APPLICATION are used to monitor the completed component that is passed through the conveyer at any specified time. Power reduction and energy utilization is minimized using Efficient PLC Programming. The entire process is Monitored and Controlled remotely using SCADA. The Report generation for the Conveyer process is programmed in SCADA like Conveyer Cycle time, Conveyer Idle Time and these data can be automatically saved in the Excel Data format (Data Logging Process). The whole process can be controlled using the Android mobile application in which the conveyer is controlled wireless in a Particular region of the Industry. The controllable range of the conveyor using the mobile application can also be extended to a wide range (apart from the industry premises) using multiple LAN connections. Where older automated conveyor systems would use in PLC and SCADA.
该项目的主要目标是使用PLC、SCADA和Android移动应用程序对带式输送机上携带的组件进行监控。通过PLC编程对输送机的控制过程进行控制。SCADA和MOBILE APPLICATION用于监控在任何指定时间通过输送机的已完成组件。通过高效的PLC编程,降低功耗和能源利用率。整个过程通过SCADA进行远程监控。输送机过程的报告生成是用SCADA编程的,如输送机周期时间,输送机空闲时间,这些数据可以自动保存在Excel数据格式(数据记录过程)中。整个过程可以使用Android移动应用程序进行控制,在该应用程序中,输送机在行业的特定区域进行无线控制。使用移动应用程序的输送机的可控范围也可以扩展到一个广泛的范围(除了工业场所)使用多个局域网连接。旧的自动输送系统将使用PLC和SCADA。
{"title":"Monitoring and Control of Component Transfer and Packing through Conveyors Using PLC, SCADA and Mobile Application","authors":"S. Jegandiravianath, A. Ajith, S. DharaniramT, M. Gokulnath, T. Balaji","doi":"10.31838/ijccts/07.sp01.09","DOIUrl":"https://doi.org/10.31838/ijccts/07.sp01.09","url":null,"abstract":"The main objective of the project is to monitor and control the components that are being carried over the belt \u0000conveyers using PLC, SCADA and Android Mobile Application. The conveyer is controlled through the PLC \u0000programming for its control processes. SCADA and MOBILE APPLICATION are used to monitor the completed \u0000component that is passed through the conveyer at any specified time. Power reduction and energy utilization is \u0000minimized using Efficient PLC Programming. The entire process is Monitored and Controlled remotely using \u0000SCADA. The Report generation for the Conveyer process is programmed in SCADA like Conveyer Cycle time, \u0000Conveyer Idle Time and these data can be automatically saved in the Excel Data format (Data Logging Process). \u0000The whole process can be controlled using the Android mobile application in which the conveyer is controlled \u0000wireless in a Particular region of the Industry. The controllable range of the conveyor using the mobile application \u0000can also be extended to a wide range (apart from the industry premises) using multiple LAN connections. Where \u0000older automated conveyor systems would use in PLC and SCADA.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128115972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Active Low Energy Outlay Routing Algorithm for Wireless Ad Hoc Network  无线自组织网络的主动低能耗路由算法
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/03.01.02
{"title":"Active Low Energy Outlay Routing Algorithm for Wireless Ad Hoc Network ","authors":"","doi":"10.31838/ijccts/03.01.02","DOIUrl":"https://doi.org/10.31838/ijccts/03.01.02","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128187203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analyzing Security of Single Sign on System through Advanced Encryption Standard  用高级加密标准分析单点登录系统的安全性
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/02.01.04
{"title":"Analyzing Security of Single Sign on System through Advanced Encryption Standard ","authors":"","doi":"10.31838/ijccts/02.01.04","DOIUrl":"https://doi.org/10.31838/ijccts/02.01.04","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"339 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134227423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A chaos based image encryption algorithm using Shimizu-Morioka system  基于Shimizu-Morioka系统的混沌图像加密算法
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/04.01.02
{"title":"A chaos based image encryption algorithm using Shimizu-Morioka system ","authors":"","doi":"10.31838/ijccts/04.01.02","DOIUrl":"https://doi.org/10.31838/ijccts/04.01.02","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121758109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Speed 3d DWT VlSI Architecture for Image Processing Using Lifting Based Wavelet Transform  基于提升小波变换的高速三维DWT VlSI结构图像处理
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/01.02.04
Senthilkumar.M, Uma.S
Although the DCT-based image compression method using in the JPEG standard has been very successful in the several years, it still has some properties to improvement. A fundamental shift in the image compression approach came after the discrete wavelet transform (DWT) became popular, and it is adopted in the new JPEG 2000 standard So the digital information must be stored and retrieved in an efficient and effective manner, in order for it to be put to practical use. The Discrete Wavelet Transform (DWT) was based on time-scale representation. It provides efficient multi-resolution. DWT has been implemented by convolution method. For Such an implementation it requires a large number of computations and a large storage features that are not suitable for either high-speed or low-power applications. Hence the architecture for a high speed lifting based 3D (DWT) VLSI architecture is proposed. The lifting based DWT architecture has the advantage of lower computational complexities and also requires less memory. This lifting scheme has several advantages, including in-place computation of the DWT, integer-to-integer wavelet transform (IWT), symmetric forward and inverse transform. It uses a combination of 1D-DWT along with a set of memory buffers between the stages. The whole architecture was arranged in efficient way to speed up and achieve higher hardware utilization. It is desirable for high-speed VLSI applications. Keywords— Discrete Wavelet Transform, VLSI architecture, lifting, image compression, High-Speed.
尽管JPEG标准中使用的基于dct的图像压缩方法近年来取得了很大的成功,但它仍有一些有待改进的特性。随着离散小波变换(DWT)的流行,图像压缩方法发生了根本性的变化,并被应用到新的JPEG 2000标准中,因此为了使其实际应用,必须以一种高效有效的方式存储和检索数字信息。离散小波变换(DWT)基于时间尺度表示。它提供了高效的多分辨率。采用卷积方法实现了小波变换。对于这样的实现,它需要大量的计算和大量的存储特性,这些特性不适合高速或低功耗应用程序。在此基础上,提出了一种基于高速提升的三维(DWT) VLSI架构。基于提升的DWT体系结构具有计算复杂性较低的优点,并且需要较少的内存。该提升方案具有就地计算小波变换、整数到整数小波变换、对称正、逆变换等优点。它使用1D-DWT的组合以及阶段之间的一组内存缓冲区。整个架构以高效的方式安排,以提高速度和实现更高的硬件利用率。它是高速VLSI应用的理想选择。关键词:离散小波变换,VLSI架构,提升,图像压缩,高速。
{"title":"High Speed 3d DWT VlSI Architecture for Image Processing Using Lifting Based Wavelet Transform ","authors":"Senthilkumar.M, Uma.S","doi":"10.31838/ijccts/01.02.04","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.04","url":null,"abstract":"Although the DCT-based image compression method using in the JPEG standard has been very successful in the several years, it still has some properties to improvement. A fundamental shift in the image compression approach came after the discrete wavelet transform (DWT) became popular, and it is adopted in the new JPEG 2000 standard So the digital information must be stored and retrieved in an efficient and effective manner, in order for it to be put to practical use. The Discrete Wavelet Transform (DWT) was based on time-scale representation. It provides efficient multi-resolution. DWT has been implemented by convolution method. For Such an implementation it requires a large number of computations and a large storage features that are not suitable for either high-speed or low-power applications. Hence the architecture for a high speed lifting based 3D (DWT) VLSI architecture is proposed. The lifting based DWT architecture has the advantage of lower computational complexities and also requires less memory. This lifting scheme has several advantages, including in-place computation of the DWT, integer-to-integer wavelet transform (IWT), symmetric forward and inverse transform. It uses a combination of 1D-DWT along with a set of memory buffers between the stages. The whole architecture was arranged in efficient way to speed up and achieve higher hardware utilization. It is desirable for high-speed VLSI applications. Keywords— Discrete Wavelet Transform, VLSI architecture, lifting, image compression, High-Speed.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121378864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES  采用模式匹配和动态指令序列相结合的先进病毒检测技术
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/01.01.06
M. Nithya
Network security has always been an important issue and its application is ready to perform powerful pattern matching to protect against virus attacks, spam and Trojan horses. However, attacks such as spam, spyware, worms, viruses, and phishing target the application layer rather than the network layer. Therefore, traditional firewalls no longer provide enough protection. However, the solutions in the literature for firewalls are not scalable, and they do not address the difficulty of an antivirus. The goal is to provide a systematic virus detection software solution for network security for computer systems. Instead of placing entire matching patterns on a chip, our solution is based on an antivirus processor that works as much of the filtering information as possible onto a reference memory. The infrequently accessing off-reference data to make the matching mechanism scalable to large pattern sets. In the first stage, the filtering engine can filter out more than 93.1% of data as safe, using a merged shift table. Only 6.9% or less of potentially unsafe data must be precisely checked in the second stage by the exact-matching engine from off-reference memory. In addition to that Dual port BITCAM processing program is used along with the Exact Matching Engine and Bloom Filter process. This Dual port BITCAM processes next to the exact matching engine and bloom filter process. This Dual port BITCAM process is placed exclusively for obtaining higher throughput. To reduce the memory gap and to improve the performance, we also propose three algorithms are used: 1) a skipping algorithm; 2) a cache method; and 3) a prefetching mechanism.
网络安全一直是一个重要的问题,它的应用程序准备执行强大的模式匹配,以防止病毒攻击,垃圾邮件和特洛伊木马。但是,垃圾邮件、间谍软件、蠕虫、病毒和网络钓鱼等攻击的目标是应用层,而不是网络层。因此,传统的防火墙不再提供足够的保护。然而,防火墙文献中的解决方案是不可伸缩的,并且它们没有解决反病毒的困难。目标是为计算机系统的网络安全提供系统的病毒检测软件解决方案。我们的解决方案不是将整个匹配模式放在芯片上,而是基于一个防病毒处理器,该处理器可以将尽可能多的过滤信息传输到参考内存上。不经常访问的非引用数据使匹配机制可扩展到大型模式集。在第一阶段,过滤引擎可以使用合并移位表安全地过滤掉超过93.1%的数据。只有6.9%或更少的潜在不安全数据必须在第二阶段由精确匹配引擎从非参考内存中精确检查。除此之外,双端口BITCAM处理程序与精确匹配引擎和布隆过滤器过程一起使用。这个双端口的BITCAM过程旁边的精确匹配引擎和布隆过滤器过程。这个双端口BITCAM进程是专门为获得更高的吞吐量而设置的。为了减小内存缺口和提高性能,我们还提出了三种算法:1)跳过算法;2)缓存方法;3)预取机制。
{"title":"ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES ","authors":"M. Nithya","doi":"10.31838/ijccts/01.01.06","DOIUrl":"https://doi.org/10.31838/ijccts/01.01.06","url":null,"abstract":"Network security has always been an important issue and its application is ready to perform powerful pattern matching to protect against virus attacks, spam and Trojan horses. However, attacks such as spam, spyware, worms, viruses, and phishing target the application layer rather than the network layer. Therefore, traditional firewalls no longer provide enough protection. However, the solutions in the literature for firewalls are not scalable, and they do not address the difficulty of an antivirus. The goal is to provide a systematic virus detection software solution for network security for computer systems. Instead of placing entire matching patterns on a chip, our solution is based on an antivirus processor that works as much of the filtering information as possible onto a reference memory. The infrequently accessing off-reference data to make the matching mechanism scalable to large pattern sets. In the first stage, the filtering engine can filter out more than 93.1% of data as safe, using a merged shift table. Only 6.9% or less of potentially unsafe data must be precisely checked in the second stage by the exact-matching engine from off-reference memory. In addition to that Dual port BITCAM processing program is used along with the Exact Matching Engine and Bloom Filter process. This Dual port BITCAM processes next to the exact matching engine and bloom filter process. This Dual port BITCAM process is placed exclusively for obtaining higher throughput. To reduce the memory gap and to improve the performance, we also propose three algorithms are used: 1) a skipping algorithm; 2) a cache method; and 3) a prefetching mechanism.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129793150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Preterm birth prognostic prediction using Cross domain data fusion  基于跨域数据融合的早产预后预测
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/07.01.03
{"title":"Preterm birth prognostic prediction using Cross domain data fusion ","authors":"","doi":"10.31838/ijccts/07.01.03","DOIUrl":"https://doi.org/10.31838/ijccts/07.01.03","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128955415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
GPH Algorithm: Improved CBC improved BIFID cipher Symmetric Key Algorithm  GPH算法:改进的CBC改进的BIFID密码对称密钥算法
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/01.02.03
{"title":"GPH Algorithm: Improved CBC improved BIFID cipher Symmetric Key Algorithm ","authors":"","doi":"10.31838/ijccts/01.02.03","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.03","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122196341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of communication and computer Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1