Agriculture drones: A modern breakthrough in precision agriculture

V Puri, A Nayyar, L Raja - Journal of Statistics and Management …, 2017 - Taylor & Francis
Drones commonly referred, as UAVs are mostly associated with military, industry and other
specialized operations but with recent developments in area of sensors and Information …

Research perspectives on fully homomorphic encryption models for cloud sector

S Mittal, KR Ramkumar - Journal of Computer Security, 2021 - content.iospress.com
As there is a continuous delivery of big data, the researchers are showing interest in the
applications of cloud computing concerning privacy, and security. On the other hand, many …

A cryptographic encryption technique byte–Spiral rotation encryption algorithm

S Sanal Kumar, S Anfino Sherfin - Journal of Discrete Mathematical …, 2019 - Taylor & Francis
Security is one of the most important fundamental issues for the communication of data in
the wireless world. There are various types of encryption algorithms using different …

Adaptive RSA encryption algorithm for smart grid

F Wang, Z Wang, Y Zhu - Journal of Physics: Conference Series, 2019 - iopscience.iop.org
Abstract Information security has been paid more and more attention as it is a high-weight
factor that affects many aspects in our life. Many technologies have been introduced to …

Application of Drones Technology in Agriculture: A Modern Approach

N Singh, D Gupta, M Joshi, K Yadav… - Journal of Scientific …, 2024 - journal.send2sub.com
Drone technology can be used for many applications for agricultural uses, including crop
health monitoring and farm operations like weed management, Evapotranspiration …

A DSA-like digital signature protocol

L Zahhafi, O Khadir - Journal of Discrete Mathematical Sciences …, 2022 - Taylor & Francis
A DSA-like digital signature protocol Page 1 © A DSA-like digital signature protocol Leila
Zahhafi † Omar Khadir * Laboratory of Mathematics, Cryptography, Mechanics and Numerical …

Digital signature with elliptic curves over the finite fields

M Alinejad, S Hassan Zadeh… - Journal of Discrete …, 2022 - Taylor & Francis
Let x 3+ ax+ b be an irreducible cubic polynomial over 𝔽p. Then by using transformations
x→ x+ j and x→ j–1 x, where j∈ F* p, we can generate new irreducible cubic polynomials. In …

[PDF][PDF] A Matrix-Based Homomorphic Encryption Using Random Prime Numbers

RR Ketti, S Mittal - Available at SSRN 4042651, 2022 - papers.ssrn.com
Data security has always been a concern for digital users. In general, cloud Service
Providers (CSPs) provide security to data during communication, storage, etc., using various …

[PDF][PDF] Prolong the lifetime of sensor monitoring system using schedule matrix while employing digital signatures

P Kumar, SK Sharma, KU Kadam - researchgate.net
In this paper a linear programing approach has been implemented for finding the energy
efficient path for prolonging the network lifetime of sensor monitoring systems. For a given …

Design, Aerodynamic Analysis, and Fabrication of Agricultural Drone

D Malkapuram, C Pothula, S Jaweed - 2021 - sae.org
In the present era adding technology and innovations in agriculture will help in increasing
crop productivity. The motive to use development in agriculture is not only to increase …