Search Results - (( java application testing algorithm ) OR ( device communication based algorithm ))
Search alternatives:
- device communication »
- application testing »
- communication based »
- testing algorithm »
- java application »
-
1
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…We successfully constructed the application by leveraging the robust Electron framework and employing HTML, CSS, and JavaScript languages. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. …”
Get full text
Get full text
Get full text
Article -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…Device to Device (D2D) communication has gained a lot of popularity in recent years as it offers high speed, extended coverage, and ubiquitous connectivity. …”
Get full text
Get full text
Thesis -
5
Genetic algorithm based adaptive offloading for improving IoT device communication efficiency
Published 2019“…With an extended support from cloud network, the mobile IoT devices demand flexibility and scalability in communication. …”
Get full text
Get full text
Get full text
Article -
6
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…A simplified consensus algorithm is then proposed in the thesis. It offers an identity-based encryption to create a key pair for each device. …”
Get full text
Get full text
Thesis -
7
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network
Published 2022“…Device to Device (D2D) communication is a type of technology where two devices can communicate directly with each other without the need to contact Base Station or any central infrastructure. …”
Get full text
Get full text
Thesis -
8
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
Get full text
Get full text
Thesis -
9
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…WSN getting more concern because it is the only best and easy way to collect data, communicate between device to device and device to human. …”
Get full text
Get full text
Thesis -
10
-
11
Securing IEC60870-5-101 Communication Protocol using SCADA Cryptographic and Device Authentication Gateway
Published 2023Conference Paper -
12
Performance analysis of constrained device virtualization algorithm
Published 2020“…Due to their limited capabilities, the constrained devices usually host proprietary protocols, platforms, data formats and data structures for communications and therefore, are unable to communicate with devices from different vendors. …”
Get full text
Get full text
Get full text
Article -
13
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
14
Trust‑based lightweight security protocol for device to device multihop cellular communication (TLwS)
Published 2021“…Besides basic function that is direct communication without the need of Base Station (BS), D2D allows small communicating device to act as intermediate device not only for forward the trafcs but also permits the sharing of resources such as spectrum, services, data and social contents for any users that are near the proximity range. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Dynamic tree-splitting algorithm for massive random access of M2M communications in IoT networks
Published 2021“…The DTS algorithm assigns a specific number of preambles to the collided devices for their next access attempt. …”
Get full text
Get full text
Get full text
Article -
16
Mode selection mechanism to enable effective device-to-device communication system over different environments
Published 2019“…Device-to-Device (D2D) communication is an important component of the 5G mobile networks. …”
Get full text
Get full text
Get full text
Article -
17
Mode selection mechanism to enable effective device-to-device communication system over different environments
Published 2019“…Device-to-Device (D2D) communication is an important component of the 5G mobile networks. …”
Get full text
Get full text
Get full text
Article -
18
Delay-Aware Energy-Efficient Joint Power Control and Mode Selection in Device-to-Device Communications for FREEDM Systems in Smart Grids
Published 2024“…The Device-to-device (D2D) communications are proposed as critical solutions to enhance the performance of the LTE. …”
Article -
19
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…To solve this issue, we proposed a method to help the cloud provides a suitable content for devices. Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
Get full text
Get full text
Research Reports -
20
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…Understanding and comparing algorithms implemented in IoT devices, regarding performance discussed in this paper. …”
Get full text
Get full text
Article
