Results 131 to 140 of about 53,372 (247)

Optimized reversible data hiding technique based on multidirectional prediction error histogram and fluctuation-based adaptation

open access: yesJournal of King Saud University: Computer and Information Sciences
Reversible Data Hiding Techniques (RDH) play an increasingly pivotal role in the field of cybersecurity. Overlooking the properties of the carrier image and neglecting the influence of texture can lead to undesirable distortions and irreversible data ...
Dima Kasasbeh, Mohammed Anbar
doaj   +1 more source

Demonstrating Wireless IPv6 Access to a Federated Health Record Server [PDF]

open access: bronze, 2004
D. Kalra   +8 more
openalex   +1 more source

IPv6的实现工具

open access: yesGuangtongxin yanjiu, 2001
IPv6具有很多 IPv4所不具备的优点 ,由 IPv4转换到 IPv6是 Internet发展的需要 .文章对混合堆栈机制、隧道技术以及 NAT- PT等实现 IPv6的工具进行了分析 .虽然有一些障碍影响了 IPv6的实现 ,但 ...
王立奎, 黄本雄
doaj  

Application Research of IPv6 in Mine Industrial Ethernet

open access: yesGong-kuang zidonghua, 2012
The paper introduced background and development status of IPv6, expounded development tendency and research direction of application of IPv6 in industrial Ethernet, and indicated all hardware and software based on mine industrial Ethernet should have ...
DING Yu-hui   +3 more
doaj  

Home - About - Disclaimer - Privacy