Search Results - (( using function method algorithm ) OR ( device communication issues algorithm ))
Search alternatives:
- device communication »
- communication issues »
- method algorithm »
- issues algorithm »
- function method »
- using function »
-
1
Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems
Published 2016“…Adaptive algorithms used to estimate the QM’s imperfections, operate either in online or offline mode. …”
Get full text
Get full text
Thesis -
2
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
3
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…This concept of multihop D2D communication has introduced a number of issues that were non-prevalent in current cellular communication. …”
Get full text
Get full text
Thesis -
4
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. CP-ABE algorithm is one-to-many technique suitable for secure grouping communication, but this algorithm is not a lightweight feature. …”
Get full text
Get full text
Get full text
Article -
5
Performance analysis of constrained device virtualization algorithm
Published 2020“…Due to their limited capabilities, the constrained devices usually host proprietary protocols, platforms, data formats and data structures for communications and therefore, are unable to communicate with devices from different vendors. …”
Get full text
Get full text
Get full text
Article -
6
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network
Published 2022“…Another issue is that how devices can get secure mutual authentication for secure communication. …”
Get full text
Get full text
Thesis -
7
Fair and fit resource allocation algorithm for network-controlled device-to-device (D2D) communication / Yusmardiah Yusuf, Darmawaty Mohd. Ali and Roslina Mohamad
Published 2021“…Device-to-device (D2D) communication is a promising new feature for next generation cellular networks. …”
Get full text
Get full text
Get full text
Article -
8
Enhannced sampling algorithm in bluetooth low energy for indoor localization
Published 2018“…Therefore, this project enhanced the Delta Sampling algorithm in order to mitigate this issues and through the experiments, it is proven that the proposed algorithm able to stabilize the signal while solving the sample size and number of invalid samples issue.…”
Get full text
Get full text
Thesis -
9
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
Get full text
Get full text
Thesis -
10
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…Understanding and comparing algorithms implemented in IoT devices, regarding performance discussed in this paper. …”
Get full text
Get full text
Article -
11
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…At the end of this research, we will provide a device heterogeneity detection algorithm that provides accurate information in resolving the heterogeneous device detection issues.…”
Get full text
Get full text
Research Reports -
12
-
13
A new compression algorithm for small data communication in wireless sensor network
Published 2017“…In this paper, we propose a new lossless compression algorithm that can handle small data communication in WSNs. …”
Get full text
Get full text
Get full text
Article -
14
-
15
A modified group authentication scheme for machine type communication in LTE/LTE-a networks
Published 2018“…Machine-Type Communication (MTC), as one of the essential advancements of wireless communication, has become a new business development in mobile communication. …”
Get full text
Get full text
Thesis -
16
Synaptogenesis based bio-inspired NoC fault tolerant interconnects
Published 2013“…To support the complexity of NoC many fault tolerant routing techniques have been proposed to cope with the faulty nodes and interconnects which occur during the communication. All the routing algorithms lack the adaptiveness, robustness and they also have the drawbacks of congestion, delayed communication and latency issues. …”
Get full text
Get full text
Conference or Workshop Item -
17
Synaptogenesis based bio-inspired NoC fault tolerant interconnects
Published 2013“…To support the complexity of NoC many fault tolerant routing techniques have been proposed to cope with the faulty nodes and interconnects which occur during the communication. All the routing algorithms lack the adaptiveness, robustness and they also have the drawbacks of congestion, delayed communication and latency issues. …”
Get full text
Get full text
Conference or Workshop Item -
18
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Published 2023“…Internet of Things (IoT) enables device and machine communication using TCP/IP protocol. …”
Get full text
Get full text
Thesis -
19
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
Published 2019“…Motivated by this issue, we propose Signcryption Obfuscatable and Steganography-PadSteg (SOS) algorithm as a solution. …”
Get full text
Get full text
Thesis -
20
Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar
Published 2019“…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
Get full text
Get full text
Thesis
