Search Results - (( data processing protocol algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- protocol algorithm »
- java application »
- processing »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Encryption selection for WLAN IEEE802.11G
Published 2013“…In the first scenario, the data was tested with encryption protocols and for the second scenario, the data was tested with encryption algorithms and also encryption protocols. …”
Get full text
Get full text
Thesis -
3
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…Connectivity is a critical issue in WSNs, as the data collected needs to be sent to the base station or the processing centers. …”
Get full text
Get full text
Thesis -
6
Development of wireless data acquisiton system using LoRa technology for construction of PID control system
Published 2025text::Thesis -
7
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Published 2023“…Internet of Things (IoT) enables device and machine communication using TCP/IP protocol. Message Queuing Telemetry Transport (MQTT) is the most preferred protocol and is expected to be the de facto messaging IoT standard. …”
Get full text
Get full text
Thesis -
8
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
Published 2023“…Fog computing, closer to the IoT, is formulated in data processing, filtering, aggregating, and storing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
Published 2023“…Fog computing, closer to the IoT, is formulated in data processing, filtering, aggregating, and storing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…EBCRA solves the issue of redundant re-transmission of RREQ packet and propose a routing algorithm that deal with the broadcast storm problem which is widely practiced in MANET routing protocol. …”
Get full text
Get full text
Get full text
Thesis -
12
Encryption method for SCADA security enhancement
Published 2014“…In existing survey, several mechanisim/solutionms were developed for reliable delivery of data without any attack. Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Reliable low power network protocol in IoT for agriculture field
Published 2024“…This network protocol can be further split into three separate protocols, which are the application layer protocol, network layer protocol and data link layer protocol. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Implementation of Schnorr Digital Signature into Station-to-Station Protocol / Nurul Mahira Budin, Nor Hafikah Othman and Nur Izzatie Farhana Ahmad Fauzan
Published 2018“…Thus, we implement Schnorr Digital Signature into STS protocol to use Schnorr elements in completing the key exchange process. …”
Get full text
Get full text
Student Project -
16
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. Secured communication is achieved where the notion of plausible deniability is successfully implemented by fusing the processes of theorem's verification and data's validation in the protocol construction methodology.…”
Get full text
Get full text
Thesis -
17
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…AC complement algorithm was used to compare the different in each set of data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Computational model for energy aware TDMA-based MAC protocol for wireless sensor network system
Published 2007“…This paper proposes a novel approach that tries to reduce idle energy consumption by implementing active-sleep algorithm named energy aware A-MAC protocol. The result from the computational model shows that the algorithm can prolong the network lifetime due to efficiency in energy consumption from time slot management.…”
Get full text
Get full text
Conference or Workshop Item -
19
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Furthermore, in WSNs, the operating system (OS) with its network protocol stack and media access control (MAC) layer protocol play an essential role in managing the scarce resources, data processing and communication. …”
Get full text
Get full text
Thesis -
20
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…Furthermore, the adoption of IPFS has not only boosted the accessibility of data files on the network but has also demonstrated a remarkable reduction in data sharing time, with a 27% decrease in upload times and a 23.67% decrease in download times when compared to File Transfer Protocol (FTP). …”
Get full text
Get full text
Thesis
