Search Results - (( java application using algorithm ) OR ( using communication devices algorithm ))
Search alternatives:
- communication devices »
- using communication »
- devices algorithm »
- java application »
- using algorithm »
-
1
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
2
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
3
Secure scheme for user authentication and authorization in android environment
Published 2013“…Keeping in viewpoint of security on effective authentication and authorization, this paper proposes a technique that exponentially minimizes the operational cost by using secure hash algorithms that has the potential to generate mobile-based One Time Passwords (OTPs) scheme on Android environment ensuring enhanced protection with respect to password security. …”
Get full text
Get full text
Get full text
Article -
4
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022“…LED Seven Segment displays have become embedded in our daily lives, beginning with small devices like wristwatches and progressing to massive mechanical equipment used in industry. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
-
6
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
7
Efficient radio resource allocation scheme for 5G networks with device-to-device communication
Published 2024journal::journal article -
8
-
9
Fair and fit resource allocation algorithm for network-controlled device-to-device (D2D) communication / Yusmardiah Yusuf, Darmawaty Mohd. Ali and Roslina Mohamad
Published 2021“…Device-to-device (D2D) communication is a promising new feature for next generation cellular networks. …”
Get full text
Get full text
Get full text
Article -
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
Get full text
Get full text
Thesis -
12
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…TLwS can be used easily in 5G communication where it will allow multihop D2D secure communication.…”
Get full text
Get full text
Thesis -
13
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…WSN getting more concern because it is the only best and easy way to collect data, communicate between device to device and device to human. …”
Get full text
Get full text
Thesis -
14
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network
Published 2022“…Device to Device (D2D) communication is a type of technology where two devices can communicate directly with each other without the need to contact Base Station or any central infrastructure. …”
Get full text
Get full text
Thesis -
15
Enhannced sampling algorithm in bluetooth low energy for indoor localization
Published 2018“…These network mainly used for communication and data exchange. However, it is also being used to acquired one’s or device’s position with certain accuracy. …”
Get full text
Get full text
Thesis -
16
Securing IEC60870-5-101 Communication Protocol using SCADA Cryptographic and Device Authentication Gateway
Published 2023Conference Paper -
17
Dynamic tree-splitting algorithm for massive random access of M2M communications in IoT networks
Published 2021“…The DTS algorithm assigns a specific number of preambles to the collided devices for their next access attempt. …”
Get full text
Get full text
Get full text
Article -
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Dynamic communication performance enhancement in Hierarchical Torus Network by selection algorithm
Published 2010Get full text
Get full text
Get full text
Proceeding Paper
