[Retracted] Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review

A Cheema, M Tariq, A Hafiz, MM Khan… - Security and …, 2022 - Wiley Online Library
The Distributed Denial of Service (DDoS) attack is one of the most critical issues in network
security. These sorts of attacks pose a noteworthy danger to the accessibility of network …

[PDF][PDF] Application of weighted product method for determining home renovation assistance in Pringsewu district

M Muslihudin, B Ayshwarya, DY Effendi… - International Journal of …, 2019 - academia.edu
House is a place that is needed by human beside clothing and food. House has important
function for all people, a place to unwind and gather with family. A good and comfortable …

Finger print based IoT for door lock system using RFID implementation over node MCU

V Goyal, A Walia, M Kumar, M Ghalwan… - AIP Conference …, 2023 - pubs.aip.org
In this paper, we present a door lock with extra security features like fingerprint recognition
and radio-frequency identification (RFID). It is reliable and unreachable locking systems …

Medical data processing and prediction of future health condition using sensors data mining techniques and r programming

R PraveenKumar - International Journal of Scientific Research and …, 2020 - papers.ssrn.com
The rapid development of the internet of things, cloud computing and big data, is more
Comprehensive and powerful tool in healthcare application. In healthcare management, a …

4G and 5G Communication Networks Future Analysis

AS Mohammed, ST Husein, V Porkodi… - International Journal …, 2019 - staff.lfu.edu.krd
Cellular mobile communications 5G expected to be a united technology which
accommodating the considerable number of contributor that preserve services quality …

[PDF][PDF] Computernumerically controlled machine to draw text on ardunio-based acrylic board

M Amin, H Deviana, R Andika, PT Nguyen, W Hashim… - 2019 - academia.edu
This paper presents Computer Numerically Controlled (CNC) machine to draw text on
Arduino based acrylic board. The principle working of Computer Numerical Control (CNC) is …

[PDF][PDF] Prolong the Network Lifespan of Wireless Sensor Network by Using Hpsm

MV Porkodi, D Yuvaraj, AS Mohammed, V Manikandan… - Technology, 2019 - academia.edu
It conforms with enlarging the network lifetime of WSN with the aid of the help over Fusion
PEGASIS end to end including Sink Mobility (HPSM). To prolong the community whatness …

Improvement in Secure Mosaic Image Using Style Transfer

R PraveenKumar - International Journal of Scientific Research and …, 2020 - papers.ssrn.com
A secure transmission of Secret image method is proposed in which the style image is the
target image and it is used for secret fragment visible mosaic image. The size of the Mosaic …

Job Scheduling in Big Data–A Survey

P Divya, M Ramesh - papers.ssrn.com
To quantify the large amount of data stored electronically is not easy. The large amount of
data (Data is in the unit of zettabytes or exabytes) is called Big Data. To process these large …

Line Follower Robotics Using IOT

S Kabilan, E Arunmaran - 2019 - papers.ssrn.com
TRANSBOT is a line follower robot that is used over industrial purposes in transportation
Department. A line follower is a robot which follows either black or white line. It detects …