Signed integers are normally represented using 2’s complement representation. Addition and subtraction of signed numbers is done similar to that of unsigned numbers. However carry (or borrow) is simply ignored. Unlike un...
This paper focuses the Internet of Things. Main enabling feature of this promising model is the integration of several technologies and communication solutions. Identification and tracking technologies, wired and wireles...
This is the era of digital information as digital image plays a vital role in every field of human lives. A digital image is both informative and flexible since it is easy to edit and redistribute. The vulnerability of d...
Private data such as electronic health records and banking transactions must be shared within the cloud environment to analysis or mine data for research purposes. Data privacy is one of the most concerned issues in big...
TOR( The Onion Router) network is a system that provide anonymity for its client by routing the client packets via various volunteering networks, such routing conceals the clients location & activity thus making traf...
EP ID EP89731
DOI -
Views 129
Downloads 0
How To Cite
P. Iswarya, Dr. V. Radha (2015). . International Journal of Computer Science & Engineering Technology, 6(6),
386-391. https://europub.co.uk/articles/-A-89731
Sign In Europub
For faster login or register use your social account.
Operations on Signed Numbers
Signed integers are normally represented using 2’s complement representation. Addition and subtraction of signed numbers is done similar to that of unsigned numbers. However carry (or borrow) is simply ignored. Unlike un...
Survey on energy consumption in wireless IOT
This paper focuses the Internet of Things. Main enabling feature of this promising model is the integration of several technologies and communication solutions. Identification and tracking technologies, wired and wireles...
DIGITAL WATERMARKING: A SURVEY
This is the era of digital information as digital image plays a vital role in every field of human lives. A digital image is both informative and flexible since it is easy to edit and redistribute. The vulnerability of d...
Data Anonymization Approach For Privacy Preserving In Cloud
Private data such as electronic health records and banking transactions must be shared within the cloud environment to analysis or mine data for research purposes. Data privacy is one of the most concerned issues in big...
Security against attacks in TOR networks
TOR( The Onion Router) network is a system that provide anonymity for its client by routing the client packets via various volunteering networks, such routing conceals the clients location & activity thus making traf...