Rabin Fingerprint-Based Provenance Compression Scheme for Wireless Sensor Network

Y Yang, Z Zhang, W Yang - International Conference on Mobile Networks …, 2022 - Springer
Provenance is considered an effective mechanism to evaluate the reliability of data. To
avoid the linear growth of provenances with the growth of the packet transmission path, this …

[HTML][HTML] WSN 中基于逐级重建的Provenance 增量压缩

王昌达, 徐芹宝, 宋泽, 毛健 - 哈尔滨工程大学学报, 2018 - html.rhhz.net
在无线传感器网络(WSN) 中, 一般使用溯源(Provenance) 对基站(BS) 接收的数据进行可信性
评估. 针对当前的Provenance 分段传输方法平均压缩比较低, 并且只有当获取所有Provenance …

Using Satellite Imagery, Real-Time Detection and Prediction of Agricultural Land Degradation due to Urbanization Intrusion.

AV Turukmane, D Ramkumar - Grenze International Journal …, 2023 - search.ebscohost.com
Since agriculture is the main source of food and other raw resources, it is regarded as the
basis of all life. It is essential to the economic progress of the nation. Regrettably, a lot of our …

[PDF][PDF] Study on Cloud Based IP Traceback Authentication Framework

KB Indulekha - 2020 - academia.edu
IP traceback is utilized to discover arrange traffic assault. Beginning of IP bundle isn't
confirmed. So wellspring of IP address isn't trusted. A period constrained token based …