Search Results - (( java implication tree algorithm ) OR ( parameter communication devices algorithm ))
Search alternatives:
- parameter communication »
- communication devices »
- devices algorithm »
- java implication »
- implication tree »
- tree algorithm »
-
1
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
Get full text
Get full text
Thesis -
2
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…WSN getting more concern because it is the only best and easy way to collect data, communicate between device to device and device to human. …”
Get full text
Get full text
Thesis -
3
-
4
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis -
5
Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri
Published 2015“…Therefore, the effect of file sizes on encryption and decryption in constrained devices have been analyzed using two types of cryptographic algorithm which is AES-128 (symmetric-key encryption) and RSA- 2048 (asymmetric-key encryption) based on the different file size, execution time, and the throughput. …”
Get full text
Get full text
Thesis -
6
A new compression algorithm for small data communication in wireless sensor network
Published 2017“…In this paper, we propose a new lossless compression algorithm that can handle small data communication in WSNs. …”
Get full text
Get full text
Get full text
Article -
7
The use of people rank technique for data dissemination in opportunistic network
Published 2015“…In this paper, we are going to develop on one of the forwarding algorithm, People Rank algorithm, which is a social-based forwarding algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
Efficient Discovery Protocol for Ubiquitous Communication in Wireless Environment
Published 2009“…Ubiquitous computing environment means an environment which is saturated by elements or devices with capacities of computing and communication. …”
Get full text
Get full text
Thesis -
9
Adaptive beamforming of steerable array monopole antenna for WLAN application
Published 2018“…The modern communication systems are using smart portable devices that operate on WLAN frequency of 2.45 GHz. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…The number of IoT devices is growing exponentially. Due to the massive wave of IoT objects, their diversity and heterogeneity among their architectures, the existing communication protocols for wireless networks become ineffective in the context of IoT. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
Published 2019“…This leaves some vulnerability during communication. In other to achieve the security enhancement, efficiency and reduce communication overheads by using small security parameter and the effect of such a security complexity trade-off. …”
Get full text
Get full text
Thesis -
13
Mobility management schemes based on multiple criteria for optimization of seamless handover in long term evolution networks
Published 2014“…The tremendous growth of mobile devices and their attendant applications demand for wireless communication networks supporting high data rates with large capacity. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…The ADR schemes also presented high computational time due to communication channel breakdown, latency, and susceptibility to the cyberattack since the communication channel is used for the trip command transmission and considering the high cost of communication medium. …”
Get full text
Get full text
Thesis -
17
The effect of total bits and number of LFSRs on the hardware performance of modified A5/1 stream ciphers
Published 2024journal::journal article -
18
Bio-inspired network on chip having both guaranteed throughput and best effort services using fault-tolerant algorithm
Published 2018“…Faults in the NoC arise as the size of the devices are shrinking on the NoC, which include the router, links, and processing elements (PEs), to accommodate the complex communication requirements of applications. …”
Get full text
Get full text
Article -
19
Bio-inspired network on chip having both guaranteed throughput and best effort services using fault-tolerant algorithm
Published 2018“…Faults in the NoC arise as the size of the devices are shrinking on the NoC, which include the router, links, and processing elements (PEs), to accommodate the complex communication requirements of applications. …”
Get full text
Get full text
Article -
20
The development of instrument for real-time monitoring of heavy metal discharge for batik industry
Published 2019“…The control algorithm using PID loop was implemented in the system devices to generate the sufficient voltage input energizing the conductivity sensor. …”
Get full text
Get full text
Thesis
