Search Results - (( using function method algorithm ) OR ( device communication issues algorithm ))

Refine Results
  1. 1

    Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems by Talebpour, Faraz

    Published 2016
    “…Adaptive algorithms used to estimate the QM’s imperfections, operate either in online or offline mode. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication by Yasir, Javed

    Published 2020
    “…This concept of multihop D2D communication has introduced a number of issues that were non-prevalent in current cellular communication. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain by Muhammad, Norhidayah, Mohamad Zain, Jasni

    Published 2019
    “…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. CP-ABE algorithm is one-to-many technique suitable for secure grouping communication, but this algorithm is not a lightweight feature. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Performance analysis of constrained device virtualization algorithm by Haseeb, Shariq, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ismail, Ahmad Faris

    Published 2020
    “…Due to their limited capabilities, the constrained devices usually host proprietary protocols, platforms, data formats and data structures for communications and therefore, are unable to communicate with devices from different vendors. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network by Rashad Mahmood, Saqib, Adnan Shahid, Khan

    Published 2022
    “…Another issue is that how devices can get secure mutual authentication for secure communication. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Enhannced sampling algorithm in bluetooth low energy for indoor localization by Mat Daud, Mohd Faiz

    Published 2018
    “…Therefore, this project enhanced the Delta Sampling algorithm in order to mitigate this issues and through the experiments, it is proven that the proposed algorithm able to stabilize the signal while solving the sample size and number of invalid samples issue.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Blockchain based security framework for device authentication and data communication in decentralized IoT network by Alahmed, Mahmoud Tayseer

    Published 2023
    “…First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Comparison of ECC and RSA algorithms in IOT devices by Vahdati, Zeinab, Md Yasin, Sharifah, Nesheli, Ali Ghasempour, Salehi, Mohammad

    Published 2019
    “…Understanding and comparing algorithms implemented in IoT devices, regarding performance discussed in this paper. …”
    Get full text
    Get full text
    Article
  11. 11

    WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.] by Ahmad, Illiasaak, Anak Buja, Alya@Geogiana, Abdullah Sani, Anis Shobirin

    Published 2013
    “…At the end of this research, we will provide a device heterogeneity detection algorithm that provides accurate information in resolving the heterogeneous device detection issues.…”
    Get full text
    Get full text
    Research Reports
  12. 12
  13. 13

    A new compression algorithm for small data communication in wireless sensor network by Tuama, Ammar Yaseen, Mohamed, Mohamad Afendee, Muhammed, Abdullah, Mohd Hanapi, Zurina

    Published 2017
    “…In this paper, we propose a new lossless compression algorithm that can handle small data communication in WSNs. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A modified group authentication scheme for machine type communication in LTE/LTE-a networks by Ismail, Haqi Khalid

    Published 2018
    “…Machine-Type Communication (MTC), as one of the essential advancements of wireless communication, has become a new business development in mobile communication. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Synaptogenesis based bio-inspired NoC fault tolerant interconnects by Sethi, Muhammad Athar Javed, Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2013
    “…To support the complexity of NoC many fault tolerant routing techniques have been proposed to cope with the faulty nodes and interconnects which occur during the communication. All the routing algorithms lack the adaptiveness, robustness and they also have the drawbacks of congestion, delayed communication and latency issues. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Synaptogenesis based bio-inspired NoC fault tolerant interconnects by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2013
    “…To support the complexity of NoC many fault tolerant routing techniques have been proposed to cope with the faulty nodes and interconnects which occur during the communication. All the routing algorithms lack the adaptiveness, robustness and they also have the drawbacks of congestion, delayed communication and latency issues. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm by Hintaw, Ahmed Jameel

    Published 2023
    “…Internet of Things (IoT) enables device and machine communication using TCP/IP protocol. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems by Uwadiegwu, Inyama Victor

    Published 2019
    “…Motivated by this issue, we propose Signcryption Obfuscatable and Steganography-PadSteg (SOS) algorithm as a solution. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar by Mohamed Azhar, Nur Afiqah

    Published 2019
    “…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
    Get full text
    Get full text
    Thesis