Search Results - (( java implementation force algorithm ) OR ( remote communication issues algorithm ))
Search alternatives:
- implementation force »
- remote communication »
- communication issues »
- java implementation »
- issues algorithm »
- force algorithm »
-
1
Implementation and integration of HF messaging system with cryptographic features
Published 2006“…However, the infrastructures of communication still become an issue especially in the remote places. …”
Get full text
Get full text
Get full text
Thesis -
2
A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT
Published 2021“…The offline joining is added to avoid remote network intrusions and the risk of network service interruptions. …”
Get full text
Get full text
Article -
3
-
4
Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN
Published 2022“…Due to finite resource, multiple issues need to be considered in designing such system, including AG flight time, coverage radius and the achievable data rate of the ground-to-air system, thus an Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
Published 2019“…Motivated by this issue, we propose Signcryption Obfuscatable and Steganography-PadSteg (SOS) algorithm as a solution. …”
Get full text
Get full text
Thesis -
6
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…Precisely, biomedical sensors in a WBAN collect physiological signal from human’s body to enable remote, continuous and real-time network services. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
9
A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry
Published 2021“…The proposed scheme uses the AES-ECC algorithm to provide secure communication and efficient key management. …”
Get full text
Get full text
Article -
10
Energy Management Strategies for Optimal Hybrid Microgrid Configuration in the Smart Village Context
Published 2018“…With these aims, an effective power dispatch algorithm has been developed for clustered microgrids incorporating power sharing control using Power Line Communication (PLC). …”
Get full text
Get full text
Get full text
Thesis -
11
Monitoring cathodic protection system for underground pipeline
Published 2013“…A multiple platform of remote data communication was proposed to improve the current CP monitoring system. …”
Get full text
Get full text
Thesis -
12
Binary vote assignment on grid quorum replication technique with association rule
Published 2018“…First step is mining the data by using Apriori algorithm from Association Rules. It is used to discover the correlation between data. …”
Get full text
Get full text
Thesis -
13
