Search Results - (( java application using algorithm ) OR ( device communication system algorithm ))

Refine Results
  1. 1

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Secure scheme for user authentication and authorization in android environment by Dar, Humaira, Al-Khateeb, Wajdi Fawzi Mohammed, Habaebi, Mohamed Hadi

    Published 2013
    “…Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Development of seven segment display recognition using TensorFlow on Raspberry Pi by Gunawan, Teddy Surya, Mohammad Reduwan, Haque, Yaacob, Mashkuri, Mohamed Azmin, Nor Fadhillah, Ismail, Nanang, Ismail, Md Yusof, Kartiwi, Mira, A. Rahman, Azhar

    Published 2022
    “…To facilitate industrial automation, the previous process's displayed information must be recognized as the input to the subsequent process, even more so when direct communication between processes is not visible. The purpose of this paper is to develop a recognition system for seven segment displays on the Raspberry Pi. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5
  6. 6
  7. 7
  8. 8

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
    Get full text
    Get full text
    Thesis
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Optimization technique based on cluster head selection algorithm for 5G-enabled IoMT smart healthcare framework for industry by Jaaz Z.A., Ansari M.D., Josephng P.S., Gheni H.M.

    Published 2023
    “…5G mobile communication systems; Cluster analysis; Energy efficiency; Health care; Low power electronics; Medical applications; Network architecture; 'current; Cluster-head selections; Healthcare infrastructure; Internet of medical thing; Lower energies; Medical Devices; Optimization techniques; Selection algorithm; Wireless communications networks; WOWF-CHSA; Energy utilization…”
    Article
  11. 11

    Enhannced sampling algorithm in bluetooth low energy for indoor localization by Mat Daud, Mohd Faiz

    Published 2018
    “…These network mainly used for communication and data exchange. However, it is also being used to acquired one’s or device’s position with certain accuracy. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Securing IEC60870-5-101 Communication Protocol using SCADA Cryptographic and Device Authentication Gateway by Qassim Q.S., Jamil N., Mahdi M.N., Ahmad Zawawi M.N., Jamaludin M.Z., Jidin R., Rusli M.E.

    Published 2023
    “…Cryptography; Gateways (computer networks); Communications protocols; Cryptographic algorithms; Cryptographic devices; CryptoGraphics; Device authentications; FPGA technology; Practical solutions; Stuxnet; System security; Authentication…”
    Conference Paper
  13. 13

    Dynamic tree-splitting algorithm for massive random access of M2M communications in IoT networks by Althumali, Huda, Othman, Mohamed, Noordin, Nor Kamariah, Mohd Hanapi, Zurina

    Published 2021
    “…M2M systems involve a huge number of connected devices that may synchronously be activated to react to some event. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Blockchain based security framework for device authentication and data communication in decentralized IoT network by Alahmed, Mahmoud Tayseer

    Published 2023
    “…First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Communication module for urban vehicle two-way connection monitoring device: article / Ahmad Kamil Mohamad Yunus by Mohamad Yunus, Ahmad Kamil

    Published 2015
    “…This project present a communication module for urban vehicle 2-way connection monitoring device for fleet monitoring system. …”
    Get full text
    Get full text
    Article
  18. 18

    Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems by Talebpour, Faraz

    Published 2016
    “…Like other electronics devices, wireless communication systems are not immune to such imperfections. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20