Search Results - (( java application based algorithm ) OR ( device communication based algorithm ))
Search alternatives:
- device communication »
- communication based »
- application based »
- java application »
-
1
Secure scheme for user authentication and authorization in android environment
Published 2013“…Keeping in viewpoint of security on effective authentication and authorization, this paper proposes a technique that exponentially minimizes the operational cost by using secure hash algorithms that has the potential to generate mobile-based One Time Passwords (OTPs) scheme on Android environment ensuring enhanced protection with respect to password security. …”
Get full text
Get full text
Get full text
Article -
2
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022“…Every day, the application base for LED seven-segment displays expands in commercial and industrial applications. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…We successfully constructed the application by leveraging the robust Electron framework and employing HTML, CSS, and JavaScript languages. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. …”
Get full text
Get full text
Get full text
Article -
6
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…Device to Device (D2D) communication has gained a lot of popularity in recent years as it offers high speed, extended coverage, and ubiquitous connectivity. …”
Get full text
Get full text
Thesis -
7
Genetic algorithm based adaptive offloading for improving IoT device communication efficiency
Published 2019“…With an extended support from cloud network, the mobile IoT devices demand flexibility and scalability in communication. …”
Get full text
Get full text
Get full text
Article -
8
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
9
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…A simplified consensus algorithm is then proposed in the thesis. It offers an identity-based encryption to create a key pair for each device. …”
Get full text
Get full text
Thesis -
10
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network
Published 2022“…Device to Device (D2D) communication is a type of technology where two devices can communicate directly with each other without the need to contact Base Station or any central infrastructure. …”
Get full text
Get full text
Thesis -
11
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
Get full text
Get full text
Thesis -
12
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…WSN getting more concern because it is the only best and easy way to collect data, communicate between device to device and device to human. …”
Get full text
Get full text
Thesis -
13
-
14
Securing IEC60870-5-101 Communication Protocol using SCADA Cryptographic and Device Authentication Gateway
Published 2023Conference Paper -
15
Performance analysis of constrained device virtualization algorithm
Published 2020“…Due to their limited capabilities, the constrained devices usually host proprietary protocols, platforms, data formats and data structures for communications and therefore, are unable to communicate with devices from different vendors. …”
Get full text
Get full text
Get full text
Article -
16
Trust‑based lightweight security protocol for device to device multihop cellular communication (TLwS)
Published 2021“…Besides basic function that is direct communication without the need of Base Station (BS), D2D allows small communicating device to act as intermediate device not only for forward the trafcs but also permits the sharing of resources such as spectrum, services, data and social contents for any users that are near the proximity range. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Dynamic tree-splitting algorithm for massive random access of M2M communications in IoT networks
Published 2021“…The DTS algorithm assigns a specific number of preambles to the collided devices for their next access attempt. …”
Get full text
Get full text
Get full text
Article -
18
Mode selection mechanism to enable effective device-to-device communication system over different environments
Published 2019“…Device-to-Device (D2D) communication is an important component of the 5G mobile networks. …”
Get full text
Get full text
Get full text
Article -
19
Mode selection mechanism to enable effective device-to-device communication system over different environments
Published 2019“…Device-to-Device (D2D) communication is an important component of the 5G mobile networks. …”
Get full text
Get full text
Get full text
Article -
20
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis
