![](images/graphics/blank.gif)
International Journal of Computer Networks and Communications
-
Formation of the company’s competitive advantages in the supply chain management and digital economy
The article presents various approaches to the concept of "digital economy" and trends that put an effect on formation of competitiveness. It is concluded that the digital economy is a "digital" system of economic relations based on the use of information and communication technologies. Digital companies are becoming economic agents of the digital economy. The basic elements of a digital company are infrastructure (Internet access, SOFTWARE, telecommunications), e-business (conducting business through computer networks), e-Commerce (distribution of goods via the Internet).
5p
longtimenosee09
08-04-2024
1
0
Download
-
Though there is no technical definition by any statutory body for Cybercrime, it is broadly defined by the Computer Crime Research Centre as - “Crimes committed on the internet using the computer either as a tool or a targeted victim. Cybercrime could also include non-monetary offenses, such as creating and distributing small or large programs written by programmers called viruses on other computers or posting confidential business information on the Internet.
5p
hongnhan878
12-04-2019
36
2
Download
-
To set our current mechanism as scalable, we suggest a partition based approach that outplays the baseline algorithm by up to an offer the magnitude. The appropriateness of the current framework and the achievement of the algorithms are check out real locations data.
5p
hongnhan878
12-04-2019
34
1
Download
-
Our system of CDA document creation and integration is based on cloud computing and the service is offered through Open API. Developers using different platforms thus can use our system to enhance interoperability. Cloud infrastructure with mapping software “health care information”
6p
hongnhan878
12-04-2019
29
0
Download
-
In this paper, we leverage multi-cloud storage systems to provide data confidentiality against an adversary which has access to the encryption key, and can compromise a large fraction of the storage servers. For this purpose, we first introduce a novel security definition that captures data confidentiality in the new adversarial model.
7p
hongnhan878
12-04-2019
32
3
Download
-
In this project, we propose a novel heterogeneous framework to remove the problem of single-point performance bottleneck and provide a more efficient access control scheme with an auditing mechanism.
7p
hongnhan878
12-04-2019
31
2
Download
-
In this paper, the offset-shift Scheme is applied to motion reimbursement frameworks and a scheme is provided for conniving the motion-based adaptive threshold T connected with the motion sequence.
6p
hongnhan878
12-04-2019
14
1
Download
-
The greatest test for enormous information from a security perspective is the assurance of client's protection. Be that as it may, encoded information present new difficulties for cloud information de-duplication, which gets to be significant for huge information stockpiling and preparing in cloud.
7p
hongnhan878
12-04-2019
25
1
Download
-
This model identifies underlying semantic structure of a document collection from word to topic and topic to document quickly, effectively without human intervention. Initially, this model creates the topics based on Dirichlet Distribution using vector space model.
4p
hongnhan878
12-04-2019
34
1
Download
-
This paper also proposes a Facet Classification Algorithm to evaluate the faceted interface. In order to demonstrate these ideas and better understand personalized faceted search, several faceted search algorithms are proposed and evaluated using the novel evaluation methodology.
6p
hongnhan878
12-04-2019
18
0
Download
-
The vehicular nodes under NLOS situation should be figured effectively, so that the emergency vehicle can communicate to the NLOS node at accurate time period with decreased overhead were the time period depend upon the high degree of channel utilization. In this paper we are going to discuss many such methods proposed by researches by considering the advantages and drawbacks.
9p
hongnhan878
12-04-2019
21
0
Download
-
In this paper we propose a new method to manage secure group using binomial key tree approach. We show that number of encryptions performed and rekey messages constructed during membership change are less compared to the scheme proposed by Wong and others. In our scheme, it is not required to balance the tree after membership change.
10p
hongnhan878
12-04-2019
18
2
Download
-
In order to narrow down the scope of target nodes sometimes using it, multiple keywords can be efficiently executed. In order to confirm the effectiveness of the proposed method, we conducted an experiment by simulation and we will also describe the results.
11p
hongnhan878
12-04-2019
19
1
Download
-
The SVM suffers from the complex computational processes. Therefore, this paper presents a new space vector modulation controller based soft computing-high accuracy implementation of artificial neural network. An artificial neural network (ANN) structure is proposed to identify and estimated the conventional SVM for avoiding the complex computational problem and hence improve the performance of the photovoltaic inverter generation. The ANN model receives the αβ voltages information at the input side and generates the duty ratios (Ta, Tb, and Tc) as an output.
16p
hongnhan878
12-04-2019
45
2
Download
-
The query language will be in English and documents will be retrieved from Marathi documents collection. English query translation will be done dictionary based approach. To improve performance of the proposed system, query expansion using WordNet and pre-processing techniques will be employed to get good precision and recall.
5p
hongnhan878
12-04-2019
16
0
Download
-
In this scheme the format of plaintext and ciphertext are same. The three main Format Preserving Encryption modes such as FF1, FF2 and FF3 approved by National Institute of Science and Technology(NIST) are analysed and highlights the differences in performance.
4p
hongnhan878
12-04-2019
23
0
Download
-
The software platform consists of interrelated components that control hardware pools of processing, storage, and networking resources throughout a data center. Users either manage it through a web-based dashboard. But the implementation of openstack is very complex. So, we can use configuration management tools that is also known as DevOps.
5p
hongnhan878
12-04-2019
30
3
Download
-
Communication through wireless links among mobile hosts in their Antennas. Manet if often susceptible to security attacks due to its features of Physical security, Mobility modules, Lack of centralized monitoring and organization points.
6p
hongnhan878
12-04-2019
40
3
Download
-
To ensure communication between the banking server and the client, they will use security algorithms such as the Brute Force algorithm, the MD5 Hashing algorithm and the Base64 algorithm. There proposed technique will ensure the flow of payment of the card.
4p
hongnhan878
12-04-2019
31
3
Download
-
The RSA algorithm is used to secure data packets are transmit from source node to sink node by powerful clone attack, which can be eliminated by the malicious nodes. The proposed protocol can achieve high clone detection probability using randomly selected trustful witnesses and with larger network lifetime, by effectively distributing the traffic load across the network.
6p
hongnhan878
12-04-2019
28
2
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)