咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 3 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 1 篇 机械工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 航空宇航科学与技...
  • 1 篇 理学
    • 1 篇 系统科学

主题

  • 4 篇 privacy
  • 3 篇 authentication
  • 3 篇 security
  • 2 篇 attacks
  • 2 篇 wsn
  • 1 篇 1d convolutional...
  • 1 篇 vehicular ad hoc...
  • 1 篇 classifier
  • 1 篇 sensor
  • 1 篇 drones
  • 1 篇 quadratic residu...
  • 1 篇 key agreement
  • 1 篇 bilinear
  • 1 篇 formal security
  • 1 篇 lightweight
  • 1 篇 precision
  • 1 篇 recall
  • 1 篇 ensemble
  • 1 篇 human action rec...
  • 1 篇 enhanced archerf...

机构

  • 2 篇 faculty of biolo...
  • 1 篇 jaramogi oginga ...
  • 1 篇 department of co...
  • 1 篇 department of ma...
  • 1 篇 information tech...
  • 1 篇 school of inform...
  • 1 篇 department of ap...
  • 1 篇 department of co...
  • 1 篇 faculty of engin...
  • 1 篇 department of ma...
  • 1 篇 department of ac...
  • 1 篇 the world islami...
  • 1 篇 school of nursin...
  • 1 篇 department of el...
  • 1 篇 college of big d...
  • 1 篇 department of el...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 institute of mat...
  • 1 篇 computer technol...

作者

  • 6 篇 vincent omollo n...
  • 1 篇 ganesh keshaorao...
  • 1 篇 chanthirasekaran...
  • 1 篇 judith nyakanga ...
  • 1 篇 arkan a.ghaib
  • 1 篇 ahmad yahiya ahm...
  • 1 篇 sophers james
  • 1 篇 husam a.neamah
  • 1 篇 anguraju krishna...
  • 1 篇 solomon odhiambo...
  • 1 篇 nidhal kamel tah...
  • 1 篇 ali hasan ali
  • 1 篇 abdulla j.y.alda...
  • 1 篇 mustafa a.al sib...
  • 1 篇 zaid ameen abdul...
  • 1 篇 peter sungu nyak...
  • 1 篇 jafar alzubi
  • 1 篇 hend muslim jasi...
  • 1 篇 junchao ma

语言

  • 6 篇 英文
检索条件"作者=vincent omollo nyangaresi"
6 条 记 录,以下是1-10 订阅
排序:
Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles
收藏 引用
High-Confidence Computing 2023年 第4期3卷 60-72页
作者: vincent omollo nyangaresi Department of Computer Science&Software Engineering Jaramogi Oginga Odinga University of Science&TechnologyKenya
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled *** addition,they have been deployed in civilian critical infrastructure *** this environment,real-time and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks
High-Confidence Computing
收藏 引用
High-Confidence Computing 2024年 第2期4卷 82-95页
作者: vincent omollo nyangaresi Ganesh Keshaorao Yenurkar Jaramogi Oginga Odinga University of Science&Technology BondoKenya Yeshwantrao Chavan College of Engineering Wanadongri 441110India
Wireless sensor networks have been deployed in areas such as healthcare,military,transportation and home automation to collect data and forward it to remote users for further *** open wireless communication channels a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Enhancing Human Action Recognition with Adaptive Hybrid Deep Attentive Networks and Archerfish Optimization
收藏 引用
Computers, Materials & Continua 2024年 第9期80卷 4791-4812页
作者: Ahmad Yahiya Ahmad Bani Ahmad Jafar Alzubi Sophers James vincent omollo nyangaresi Chanthirasekaran Kutralakani Anguraju Krishnan Department of Accounting and Finance Faculty of BusinessMiddle East UniversityAmman11831Jordan Faculty of Engineering Al-Balqa Applied UniversitySalt19117Jordan Department of Mathematics Kongunadu College of Engineering and Technology(Autonomous)TholurpattiTrichy621215India Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and TechnologyBondo210-40601Kenya Department of Electronics and Communication Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesChennai602105India Department of Electronics and Communication Engineering Saveetha Engineering College(Autonomous)Chennai602105India Department of Computer Science and Engineering Kongunadu College of Engineering and Technology(Autonomous)TholurpattiTrichy621215India
In recent years,wearable devices-based Human Activity Recognition(HAR)models have received significant *** developed HAR models use hand-crafted features to recognize human activities,leading to the extraction of basi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 1029-1057页
作者: vincent omollo nyangaresi Arkan A.Ghaib Hend Muslim Jasim Zaid Ameen Abduljabbar Junchao Ma Mustafa A.Al Sibahee Abdulla J.Y.Aldarwish Ali Hasan Ali Husam A.Neamah Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and TechnologyBondo40601Kenya Department of Applied Electronics Saveetha School of EngineeringSIMATSChennaiTamilnadu602105India Information Technology Department Management Technical CollegeSouthern Technical UniversityBasrah61004Iraq Department of Computer Science College of Education for Pure SciencesUniversity of BasrahBasrah61004Iraq College of Big Data and Internet Shenzhen Technology UniversityShenzhen518118China Huazhong University of Science and Technology Shenzhen InstituteShenzhen518000China National Engineering Laboratory for Big Data System Computing Technology Shenzhen UniversityShenzhen518060China Computer Technology Engineering Department Iraq University CollegeBasrah61004Iraq Department of Mathematics College of Education for Pure SciencesUniversity of BasrahBasrah61004Iraq Institute of Mathematics University of DebrecenDebrecenH-4002Hungary Department of Electrical Engineering and Mechatronics Faculty of EngineeringUniversity of DebrecenDebrecen4028Hungary
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation ***,the exchange of beacons and messages over public c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Efficient Authentication Algorithm for Secure Remote Access in Wireless Sensor Networks
收藏 引用
Journal of Computer Science Research 2021年 第4期3卷 43-50页
作者: Peter Sungu Nyakomitta vincent omollo nyangaresi Solomon Odhiambo Ogara Faculty of Biological&Physical Sciences Tom Mboya University CollegeHomabayKenya School of Informatics and Innovation Systems Jaramogi Oginga Odinga University of Science and TechnologyBondoKenya
Wireless sensor networks convey mission critical data that calls for adequate privacy and security *** accomplish this objective,numerous intrusion detection schemes based on machine learning approaches have been *** ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Efficient Feature Selection and ML Algorithm for Accurate Diagnostics
收藏 引用
Journal of Computer Science Research 2022年 第1期4卷 10-19页
作者: vincent omollo nyangaresi Nidhal Kamel Taha El-Omari Judith Nyakanga Nyakina Faculty of Biological&Physical Sciences Tom Mboya University CollegeHomabayKenya The World Islamic Science and Education University AmmanJordan School of Nursing Uzima UniversityKisumuKenya
Machine learning algorithms have been deployed in numerous optimization,prediction and classification *** has endeared them for application in fields such as computer networks and medical *** these machine learning al... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论