Search Results - (( process communication devices algorithm ) OR ( java application using algorithm ))
Search alternatives:
- process communication »
- communication devices »
- devices algorithm »
- java application »
- using algorithm »
-
1
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022“…To facilitate industrial automation, the previous process's displayed information must be recognized as the input to the subsequent process, even more so when direct communication between processes is not visible. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Genetic algorithm based adaptive offloading for improving IoT device communication efficiency
Published 2019“…With an extended support from cloud network, the mobile IoT devices demand flexibility and scalability in communication. …”
Get full text
Get full text
Get full text
Article -
3
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
4
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
Get full text
Get full text
Thesis -
5
-
6
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…Device to Device (D2D) communication has gained a lot of popularity in recent years as it offers high speed, extended coverage, and ubiquitous connectivity. …”
Get full text
Get full text
Thesis -
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
Performance analysis of constrained device virtualization algorithm
Published 2020“…Due to their limited capabilities, the constrained devices usually host proprietary protocols, platforms, data formats and data structures for communications and therefore, are unable to communicate with devices from different vendors. …”
Get full text
Get full text
Get full text
Article -
9
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
Get full text
Get full text
Thesis -
10
Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications
Published 2025“…By locating itself closer to edge devices, fog computing enhances data processing. This proximity reduces latency, energy consumption, and communication costs while improving real-time response capabilities. …”
Get full text
Get full text
Get full text
Thesis -
11
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network
Published 2022“…Device to Device (D2D) communication is a type of technology where two devices can communicate directly with each other without the need to contact Base Station or any central infrastructure. …”
Get full text
Get full text
Thesis -
12
A modified group authentication scheme for machine type communication in LTE/LTE-a networks
Published 2018“…High signalling congestion occurs during the verification phase since every MTC device needs to go through a full authentication process. …”
Get full text
Get full text
Thesis -
13
-
14
Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems
Published 2016“…Like other electronics devices, wireless communication systems are not immune to such imperfections. …”
Get full text
Get full text
Thesis -
15
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
17
-
18
-
19
-
20
Biologically Inspired Network on Chip Fault Tolerant Algorithm Using Time Division Multiplexing
Published 2016“…Due to the advanced nanoscale manufacturing processes and the complex communication requirements of the processing elements (PEs) various faults have occurred on NoC. …”
Get full text
Get full text
Conference or Workshop Item
