3-Step Risk Assessment and Dissemination Framework with CCTV Video for Crime Prevention |
Yeonsu Kim, Seeun Kim, Jinho Ahn |
Vol 16, No 2 (2024), Pagination: 6311-6317
|
ABSTRACT |
|
|
Abstract Views: 155 |
|
A Study of New Micropayment Scheme for Blockchain |
Gulab Das, B. P. Tripathi |
Vol 16, No 2 (2024), Pagination: 6318-6327
|
ABSTRACT |
|
|
Abstract Views: 150 |
|
BGP Prefix Hijacking Attack and its Prevention Methods |
Afif Abugharsa, Bashir Elkharraz, Eltohami Elghoul |
Vol 16, No 2 (2024), Pagination: 6328-6331
|
ABSTRACT |
|
|
Abstract Views: 160 |
|
An Overview on Strategies to Perform VLSI Testing Productively Utilizing BIST |
Selvarasan R, G. Sudhagar |
Vol 16, No 2 (2024), Pagination: 6342-6348
|
ABSTRACT |
|
|
Abstract Views: 155 |
|
Security Reinforcement: An Overview of Multilevel Authentication Techniques |
Thamilvaani Arvaree |
Vol 16, No 2 (2024), Pagination: 6349-6355
|
ABSTRACT |
|
|
Abstract Views: 149 |
|
Assessing the influence of USB-C and USB-A Local Area Network (LAN) Cable Connector Adapters on Internet Latency Performance |
Dani Anto Pakpahan, Christian Edra Siregar, Rafael Bona Josevin Siregar, Mhd Azri Athari, Dahlan R.P. Sitompul |
Vol 16, No 2 (2024), Pagination: 6356-6359
|
ABSTRACT |
|
|
Abstract Views: 152 |
|
Artificial Intelligence in Special Education: A Literature Review |
Toluwani Victor ALIU |
Vol 16, No 2 (2024), Pagination: 6360-6367
|
ABSTRACT |
|
|
Abstract Views: 137 |
|
Efficient Iris Segmentation for Biometric Authentication in IoT using BAT Algorithm |
M. Savitha, M. Senthilkumar |
Vol 16, No 2 (2024), Pagination: 6368-6373
|
ABSTRACT |
|
|
Abstract Views: 155 |
|