Search Results - (( data (processing OR proceeding) protocol algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- protocol algorithm »
- learning algorithm »
- java application »
-
1
-
2
Encryption selection for WLAN IEEE802.11G
Published 2013“…In the first scenario, the data was tested with encryption protocols and for the second scenario, the data was tested with encryption algorithms and also encryption protocols. …”
Get full text
Get full text
Thesis -
3
-
4
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…—The Transport Layer ensures that data is sent transparently between end-users while also enabling reliable data transfer services to the higher levels. …”
Get full text
Get full text
Get full text
Proceeding -
5
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Energy-efficient scalable routing protocol based on ACO for WSNS
Published 2019Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…Connectivity is a critical issue in WSNs, as the data collected needs to be sent to the base station or the processing centers. …”
Get full text
Get full text
Thesis -
9
Best pulse selection of photoplethysmography signal through comparative method
Published 2012Get full text
Working Paper -
10
Development of wireless data acquisiton system using LoRa technology for construction of PID control system
Published 2025text::Thesis -
11
Prolonging lifetime of wireless sensor networks with mobile base station using particle swarm optimization
Published 2011Get full text
Working Paper -
12
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Published 2023“…Internet of Things (IoT) enables device and machine communication using TCP/IP protocol. Message Queuing Telemetry Transport (MQTT) is the most preferred protocol and is expected to be the de facto messaging IoT standard. …”
Get full text
Get full text
Thesis -
13
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
Published 2023“…Fog computing, closer to the IoT, is formulated in data processing, filtering, aggregating, and storing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
Published 2023“…Fog computing, closer to the IoT, is formulated in data processing, filtering, aggregating, and storing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
Differential evolution optimization for constrained routing in Wireless Mesh Networks
Published 2014“…Simulation on NS2 proves its performance advantages over AODV protocol.…”
Get full text
Get full text
Get full text
Proceeding Paper -
17
-
18
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…EBCRA solves the issue of redundant re-transmission of RREQ packet and propose a routing algorithm that deal with the broadcast storm problem which is widely practiced in MANET routing protocol. …”
Get full text
Get full text
Get full text
Thesis -
19
QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol
Published 2006Get full text
Get full text
Conference or Workshop Item -
20
Encryption method for SCADA security enhancement
Published 2014“…In existing survey, several mechanisim/solutionms were developed for reliable delivery of data without any attack. Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. …”
Get full text
Get full text
Get full text
Article
