Linked e-resources

Details

Intro
Contents
Modelling of Propagation Loss for Single Trees Using Simulated Coppice at Microwave Frequencies
1 Introduction
2 Measurement Details
3 Conclusion
References
A New Collective Simulated Annealing with Adapted Objective Function for Web Service Selection
1 Introduction
2 Related Work
3 Proposed Method
4 Experimentation
5 Case Study
6 Conclusion
References
An Image Encryption-Based Method for Handwritten Digit Recognition
1 Introduction
2 Related Works
3 Image Encryption Systems
3.1 RSA Encryption
3.2 ECC Encryption

3.3 Chaos Encryption
3.4 Knight Encryption
3.5 Arnold Encryption
3.6 Joseph Encryption
4 Proposed Method
5 Experimentation and Results
6 Conclusion and Perspectives
References
The Malaysian Higher Education Students' Perceptions and Acceptance Toward Mobile Learning During the COVID-19 Pandemic
1 Introduction
1.1 Mobile Learning in Malaysia During the COVID-19 Pandemic
2 Purpose and Objectives of the Study
3 The Conceptual Framework
4 Methodology
5 Results and Discussion
5.1 Respondent Profile
5.2 Perceptions of Mobile Technology Adoption

5.3 Mobile Learning Perceptions and Acceptance During the COVID-19 Pandemic
5.4 Open-Ended Items
6 Conclusion
References
Face Masks Use and Face Perception: Social Judgments and Emotion Recognition
1 Introduction
2 Key Parameters
2.1 Sex Recognition
2.2 Age Estimation
2.3 Trustworthiness
2.4 Attractiveness
2.5 Approachability
2.6 Emotion Perception
3 The Current Study
3.1 Participants
3.2 Materials and Stimuli
4 Design
4.1 Procedure
4.2 Data Analysis
5 Results
5.1 Experiment 1
5.2 Experiment 2
6 Discussion
References

Bibliometric Analysis of Research Publication Trends on the ICT Use in Government Institutions from 2015-2022
1 Introduction
2 Literature Review
2.1 Use ICT in Government
2.2 Bibliometrics Analysis
3 Research Methods
4 Finding and Discussion
4.1 Analysis of Global Publication
4.2 Mapping of Co-occurrences Analysis
4.3 Topic Classification and Theme Descriptions
5 Conclusion
References
A Paring-Free ID-Based Authenticated Key Agreement Protocol for IoT Environment
1 Introduction
1.1 Motivation
1.2 Outline of Paper
2 Related Work

3 Technical Background
3.1 Diffie Hellman Key Agreement Protocol
3.2 Elliptic Curve Cryptography
3.3 ECDL Hard Problem
3.4 Computational Diffie-Hellman Hard (CDHP) Problem
3.5 Identity-Based Encryption
4 Proposed Scheme
4.1 Setup
4.2 Private Key Extraction
4.3 Session Key Agreement
5 Security Analysis
5.1 MITM Attack
5.2 Known Provisionally Information Attack
5.3 Known Key Attack
5.4 Perfect Forward Security
5.5 PKG Forward Security
5.6 No Key Dominant
5.7 Replication and Unidentified Key Share Attack
6 Conclusion
References

Browse Subjects

Show more subjects...

Statistics

from
to
Export