Search Results - (( developing acquisition encryption algorithm ) OR ( java optimization sensor algorithm ))
Search alternatives:
- developing acquisition »
- optimization sensor »
- java optimization »
- sensor algorithm »
-
1
Secure radio telemetry and data acquisition using wireless data communication system with portable UHF transceivers / Mohd Dani Baba and Deepak Kumar Ghodgaonkar
Published 2003“…The data collected at RTS site are encrypted prior to transmission to the BTS by employing the One Time Pad (OTP) and Caesar Cipher algorithms. …”
Get full text
Get full text
Research Reports -
2
Encryption method for SCADA security enhancement
Published 2014Get full text
Get full text
Get full text
Article -
3
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…Wireless sensor networks operate through commonly self-organized sensor nodes to transfer data in a multi-hop approach to a central sink. …”
Get full text
Get full text
Thesis -
4
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…Wireless sensor networks operate through commonly self-organized sensor nodes to transfer data in a multi-hop approach to a central sink. …”
Get full text
Get full text
Get full text
Article -
5
Cyber vulnerabilities in smart grid and safety measures for energy meters in advanced metering system and smart meter communications
Published 2023“…This paper analyzes the complete structure of a smart grid system, implementation of technologies such as Supervisory Control and Data Acquisition (SCADA) and smart metering, as well as identifies the potential cyberthreats. …”
Article -
6
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis
