Search Results - (( evolution application interface algorithm ) OR ( java application matching algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1
  2. 2
  3. 3

    Improved handover decision algorithm using multiple criteria by Mohamed Abdullah, Radhwan, Abualkishik, Abedallah Zaid, Alwan, Ali Amer

    Published 2018
    “…Additionally, three technology interfaces were embedded in this study including Worldwide interoperability for Microwave Access (WiMAX), Wireless Local Area Network (WLAN), and Long-Term Evolution (LTE). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10