Search Results - (( _ application ((a algorithm) OR (new algorithm)) ) OR ( things application using algorithm ))*
Search alternatives:
- things application »
- using algorithm »
- new algorithm »
- a algorithm »
-
1
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
2
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…Most algorithms assume a collision slot means two tag collision. …”
Get full text
Get full text
Article -
3
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
4
-
5
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…New tools based both on clever applications of established algorithms and on new methodologies, empower us to do entirely new things. …”
Get full text
Get full text
Final Year Project -
6
-
7
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
8
-
9
Improving throughput of TCP flows by utilizing TCP-aware backpressure scheduling
Published 2023“…Backpressure algorithm is one of the techniques that can be used to achieve the maximum network throughput policies in wireless environments by routing the traffic over a multi-hop network dynamically using congestion gradient that directing the traffic around a queuing network. …”
Get full text
Get full text
Article -
10
-
11
Improving throughput of TCP flows by utilizing TCP-aware backpressure scheduling
Published 2024“…Backpressure algorithm is one of the techniques that can be used to achieve the maximum network throughput policies in wireless environments by routing the traffic over a multi-hop network dynamically using congestion gradient that directing the traffic around a queuing network. …”
Conference Paper -
12
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
Published 2024thesis::master thesis -
13
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. …”
Get full text
Get full text
Thesis -
14
-
15
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
Get full text
Get full text
Get full text
Article -
16
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
Get full text
Get full text
Get full text
Article -
17
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…In addition, new technologies such as the Internet of Things (IoT), Autonomous Vehicles (AV), 5G, and Augmented Reality (AR) bring new demands and opportunities that MEC can make possible. …”
Get full text
Get full text
Article -
18
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al...
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter -
19
A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry
Published 2021“…The proposed scheme uses the AES-ECC algorithm to provide secure communication and efficient key management. …”
Get full text
Get full text
Article -
20
'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 T...
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter
