Search Results - (( java application using algorithm ) OR ( device communication issues algorithm ))
Search alternatives:
- device communication »
- communication issues »
- java application »
- issues algorithm »
- using algorithm »
-
1
Secure scheme for user authentication and authorization in android environment
Published 2013“…Experimented on java platform, the implementation techniques discussed in the paper are found to be very robust…”
Get full text
Get full text
Get full text
Article -
2
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…This concept of multihop D2D communication has introduced a number of issues that were non-prevalent in current cellular communication. …”
Get full text
Get full text
Thesis -
3
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. CP-ABE algorithm is one-to-many technique suitable for secure grouping communication, but this algorithm is not a lightweight feature. …”
Get full text
Get full text
Get full text
Article -
4
Performance analysis of constrained device virtualization algorithm
Published 2020“…Due to their limited capabilities, the constrained devices usually host proprietary protocols, platforms, data formats and data structures for communications and therefore, are unable to communicate with devices from different vendors. …”
Get full text
Get full text
Get full text
Article -
5
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network
Published 2022“…Another issue is that how devices can get secure mutual authentication for secure communication. …”
Get full text
Get full text
Thesis -
6
Fair and fit resource allocation algorithm for network-controlled device-to-device (D2D) communication / Yusmardiah Yusuf, Darmawaty Mohd. Ali and Roslina Mohamad
Published 2021“…Device-to-device (D2D) communication is a promising new feature for next generation cellular networks. …”
Get full text
Get full text
Get full text
Article -
7
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
8
Enhannced sampling algorithm in bluetooth low energy for indoor localization
Published 2018“…Therefore, this project enhanced the Delta Sampling algorithm in order to mitigate this issues and through the experiments, it is proven that the proposed algorithm able to stabilize the signal while solving the sample size and number of invalid samples issue.…”
Get full text
Get full text
Thesis -
9
-
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
Get full text
Get full text
Thesis -
12
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…Understanding and comparing algorithms implemented in IoT devices, regarding performance discussed in this paper. …”
Get full text
Get full text
Article -
13
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…At the end of this research, we will provide a device heterogeneity detection algorithm that provides accurate information in resolving the heterogeneous device detection issues.…”
Get full text
Get full text
Research Reports -
14
Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems
Published 2016“…Like other electronics devices, wireless communication systems are not immune to such imperfections. …”
Get full text
Get full text
Thesis -
15
-
16
A new compression algorithm for small data communication in wireless sensor network
Published 2017“…In this paper, we propose a new lossless compression algorithm that can handle small data communication in WSNs. …”
Get full text
Get full text
Get full text
Article -
17
-
18
A modified group authentication scheme for machine type communication in LTE/LTE-a networks
Published 2018“…Machine-Type Communication (MTC), as one of the essential advancements of wireless communication, has become a new business development in mobile communication. …”
Get full text
Get full text
Thesis -
19
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis
