Search Results - (( using function method algorithm ) OR ( basic communication devices algorithm ))
Search alternatives:
- communication devices »
- basic communication »
- devices algorithm »
- method algorithm »
- function method »
- using function »
-
1
-
2
Adaptive routing algorithms and implementation for TESH network
Published 2013Get full text
Get full text
Get full text
Article -
3
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…Device to Device (D2D) communication has gained a lot of popularity in recent years as it offers high speed, extended coverage, and ubiquitous connectivity. …”
Get full text
Get full text
Thesis -
4
Development and integration of capacitive sensing and electrocuting grid for mosquitoes surveillance and control
Published 2020“…Smart Kit can be installed on conventional traps to convert them into smart traps with Internet of Things (IoT) functionality. The Base Station relays surveillance, control and maintenance data between the smart traps and the Central Server using cellular internet access and Long Range (LoRa) radio. …”
Get full text
Get full text
Get full text
Thesis -
5
Trust‑based lightweight security protocol for device to device multihop cellular communication (TLwS)
Published 2021“…Besides basic function that is direct communication without the need of Base Station (BS), D2D allows small communicating device to act as intermediate device not only for forward the trafcs but also permits the sharing of resources such as spectrum, services, data and social contents for any users that are near the proximity range. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
-
7
Dynamic communication performance of a TESH network under the nonuniform traffic patterns
Published 2008Get full text
Get full text
Get full text
Proceeding Paper -
8
-
9
-
10
A cost and delay estimation of a suite of low-cost adaptive routers for hierarchical torus network
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
11
High performance hierarchical torus network
Published 2012Get full text
Get full text
Proceeding Paper -
12
On dynamic communication performance of a hierarchical 3D-mesh network
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
13
-
14
Hierarchical Tori Connected Mesh Network
Published 2013Get full text
Get full text
Get full text
Book Chapter -
15
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis -
16
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…One such lightweight scheme is the AA-Beta (AAḃ) asymmetric cryptographic scheme whose algorithm consists of only basic arithmetic operations of addition and subtraction for both the encryption and decryption processes. …”
Get full text
Get full text
Thesis -
17
On uniform traffic pattern of symmetric midimew connected mesh network
Published 2015Get full text
Get full text
Get full text
Proceeding Paper -
18
Development of a novel fault management in distribution system using distribution automation system in conjunction with GSM communication
Published 2013“…The proposed fault management system is design based on GSM (global system for mobile) communication. The system has been equipped with current sensor as field data interface devices, microcontroller as remote terminal unit, GSM as communication network, computer as master terminal unit and visual basic as human interface (HMI) software. …”
Get full text
Get full text
Article -
19
-
20
Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar
Published 2019“…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
Get full text
Get full text
Thesis
