Search Results - (( using function method algorithm ) OR ( basic communication devices algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication by Yasir, Javed

    Published 2020
    “…Device to Device (D2D) communication has gained a lot of popularity in recent years as it offers high speed, extended coverage, and ubiquitous connectivity. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development and integration of capacitive sensing and electrocuting grid for mosquitoes surveillance and control by Khoo, Brendan Teng Thiam

    Published 2020
    “…Smart Kit can be installed on conventional traps to convert them into smart traps with Internet of Things (IoT) functionality. The Base Station relays surveillance, control and maintenance data between the smart traps and the Central Server using cellular internet access and Long Range (LoRa) radio. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Trust‑based lightweight security protocol for device to device multihop cellular communication (TLwS) by Adnan Shahid, Khan, Yasir, Javed, Johari, Abdullah, Kartinah, Zen

    Published 2021
    “…Besides basic function that is direct communication without the need of Base Station (BS), D2D allows small communicating device to act as intermediate device not only for forward the trafcs but also permits the sharing of resources such as spectrum, services, data and social contents for any users that are near the proximity range. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…One such lightweight scheme is the AA-Beta (AAḃ) asymmetric cryptographic scheme whose algorithm consists of only basic arithmetic operations of addition and subtraction for both the encryption and decryption processes. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Development of a novel fault management in distribution system using distribution automation system in conjunction with GSM communication by Ab Ghani, Mohd Ruddin, Mat Hanafiah, Mohd Ariff, Raman, Siti Hajar, Wan Jusoh, Wan Nor Shela Ezwane, Baharudin, Zikri Abadi

    Published 2013
    “…The proposed fault management system is design based on GSM (global system for mobile) communication. The system has been equipped with current sensor as field data interface devices, microcontroller as remote terminal unit, GSM as communication network, computer as master terminal unit and visual basic as human interface (HMI) software. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar by Mohamed Azhar, Nur Afiqah

    Published 2019
    “…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
    Get full text
    Get full text
    Thesis