Results 131 to 140 of about 14,435 (215)

Optimized reversible data hiding technique based on multidirectional prediction error histogram and fluctuation-based adaptation

open access: yesJournal of King Saud University: Computer and Information Sciences
Reversible Data Hiding Techniques (RDH) play an increasingly pivotal role in the field of cybersecurity. Overlooking the properties of the carrier image and neglecting the influence of texture can lead to undesirable distortions and irreversible data ...
Dima Kasasbeh, Mohammed Anbar
doaj  

Optimizing bandwidth utilization and traffic control in ISP networks for enhanced smart agriculture. [PDF]

open access: yesPLoS One
Hassan ES   +5 more
europepmc   +1 more source

SCHC over LoRaWAN Efficiency: Evaluation and Experimental Performance of Packet Fragmentation. [PDF]

open access: yesSensors (Basel), 2022
Muñoz R   +4 more
europepmc   +1 more source

Formal modeling and analysis of security schemes of RPL protocol using colored Petri nets. [PDF]

open access: yesPLoS One, 2023
Ahmad F   +6 more
europepmc   +1 more source

Cost analysis of IPv6 distributed mobility management protocols in comparison with TFMIPv6. [PDF]

open access: yesPLoS One
Aman M   +6 more
europepmc   +1 more source

DNS for IoT: A Survey. [PDF]

open access: yesSensors (Basel), 2023
Ayoub I   +3 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy