Search Results - (( data integration protocol algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- integration protocol »
- protocol algorithm »
- data integration »
- java application »
-
1
Implementation of Station-To-Station (STS) protocol using Elliptic Curve Digital Signature Al Algorithm / Muhammad Faris Fakhri Rozi, Alya Syuhada Ismail and Emylia Suhaimi
Published 2018“…This protocol will provide an element of authentication element and data integrity in the system. …”
Get full text
Get full text
Student Project -
2
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…Routing algorithms must ensure the data transmission in an efficient way, having proper knowledge of the IoT system. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. …”
Get full text
Get full text
Thesis -
4
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Published 2023“…Therefore, this research work presented an integrated scheme known as “Secure Hybrid Scheme”, to protect the MQTT protocol against any exploitations that might result in sophisticated cyberattacks. …”
Get full text
Get full text
Thesis -
7
QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol
Published 2006“…The protocol has been introduced by Salvador et al. (Extended via Multi-protocol Label Switching (MPLS)) provides connection-oriented setup and multicast tree construction control for Optical Internet data forwarding in the network backbone area. …”
Get full text
Get full text
Conference or Workshop Item -
8
Development of wireless data acquisiton system using LoRa technology for construction of PID control system
Published 2025text::Thesis -
9
-
10
Adaptive time synchronization in time sensitive-wireless sensor networks based on stochastic gradient algorithms framework
Published 2025“…This study proposes a novel time-synchronization protocol inspired by stochastic gradient algorithms. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Software Development For Conversion Of Ip To Wireless Atm (Watm)
Published 2002“…In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. …”
Get full text
Get full text
Thesis -
13
On the security of digital signature protocol based on iterated function systems.
Published 2011“…Hash functions are used within digital signature schemes to provide data integrity for cryptographic applications. In this paper, we take a closer look at the security and efficiency of the digital signature protocol based on fractal maps. …”
Get full text
Get full text
Get full text
Article -
14
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…In IoT network, the malicious intruders can exploit the routing system of the standardized routing protocol, e.g., RPL (The Routing Protocol for Low-Power and Lossy Networks), that does not observe the node’s routing behavior prior to data forwarding, and can launch various forms of routing attacks. …”
Get full text
Get full text
Get full text
Article -
15
Adaptive reservation TDMA protocol for wireless multimedia traffic
Published 2001“…Integration of CBR, voice, VBR, data and control traffic over the wireless ATM channel using the proposed AR-TDMA protocol is considered in the paper. …”
Get full text
Get full text
Get full text
Article -
16
Adaptive reservation TDMA protocol for wireless multimedia traffic
Published 2001“…Integration of CBR, voice, VBR, data and control traffic over the wireless ATM channel using the proposed AR-TDMA protocol is considered in the paper. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…This particular research successfully produced a protocol to suit AES encryption algorithm in Internet Protocol Security (IPSec).…”
Get full text
Get full text
Monograph -
18
Implementation of Schnorr Digital Signature into Station-to-Station Protocol / Nurul Mahira Budin, Nor Hafikah Othman and Nur Izzatie Farhana Ahmad Fauzan
Published 2018“…As a recommendation, in order to improve this project, the researchers may provide data integrity by using Hashing algorithm.…”
Get full text
Get full text
Student Project -
19
Vehicular ad-hoc network (vanets) for electrical vehicle charging management
Published 2025text::Thesis -
20
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Some of these challenges result from the transmission of huge amounts of data in each data sensing period and the complexity of SHM algorithms. …”
Get full text
Get full text
Thesis
