Artykuły w czasopismach na temat „Secured transmission”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Secured transmission”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
E, Kanniga. "Huffman Algorithm for Secured Data Transmission". International Journal of Psychosocial Rehabilitation 23, nr 3 (30.07.2019): 456–63. http://dx.doi.org/10.37200/ijpr/v23i3/pr190143.
Pełny tekst źródłaDebita, Grzegorz, Przemysław Falkowski-Gilski, Marcin Habrych, Bogdan Miedziński, Jan Wandzio i Przemysław Jedlikowski. "Secured wired BPL voice transmission system". Scientific Journal of the Military University of Land Forces 198, nr 4 (15.12.2020): 947–55. http://dx.doi.org/10.5604/01.3001.0014.6065.
Pełny tekst źródłaNarmadha., R. P. "OVERLAPPED WATERMARKING FOR SECURED DATA TRANSMISSION." International Journal of Advanced Research 4, nr 5 (31.05.2016): 940–45. http://dx.doi.org/10.21474/ijar01/535.
Pełny tekst źródłaSultana, Jeenat, i Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET". International Journal of Electrical and Computer Engineering (IJECE) 8, nr 6 (1.12.2018): 4412. http://dx.doi.org/10.11591/ijece.v8i6.pp4412-4422.
Pełny tekst źródłaSrinivasan, P., A. Kannagi i P. Rajendiran. "Laplace Angular Displaced Secure Data Transmission for Internet of Things Based Health Care Systems". Journal of Medical Imaging and Health Informatics 11, nr 11 (1.11.2021): 2868–74. http://dx.doi.org/10.1166/jmihi.2021.3883.
Pełny tekst źródłaEt.al, G. Aparna. "A Watermark Approach for Image Transmission: Implementation of Channel Coding Technique with Security". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, nr 3 (11.04.2021): 3976–84. http://dx.doi.org/10.17762/turcomat.v12i3.1687.
Pełny tekst źródłaPadmaja, P., i G. V. Marutheswar. "Certain Investigation on Secured Data Transmission in Wireless Sensor Networks". International Journal of Mobile Computing and Multimedia Communications 8, nr 1 (styczeń 2017): 48–61. http://dx.doi.org/10.4018/ijmcmc.2017010104.
Pełny tekst źródłaKARTHIKEYAN, A., i GOKUL S. SAI. "SECURED WIRELESS TRANSMISSION PROTOCOL USING NTP SERVER". i-manager’s Journal on Wireless Communication Networks 6, nr 4 (2018): 38. http://dx.doi.org/10.26634/jwcn.6.4.14294.
Pełny tekst źródłapandey, K. S. Abitha, Anjali. "Secured Data Transmission Using Elliptic Curve Cryptography". International Journal of Innovative Research in Computer and Communication Engineering 03, nr 03 (30.03.2015): 1419–25. http://dx.doi.org/10.15680/ijircce.2015.0303003.
Pełny tekst źródłaSundarraj, P. Daniel. "SECURED DATA TRANSMISSION IN MOBILE ADHOC NETWORKS". International Journal of Advanced Research in Computer Science 8, nr 9 (30.09.2017): 422–24. http://dx.doi.org/10.26483/ijarcs.v8i9.5100.
Pełny tekst źródłaLi, Zhongwen, Qian Li, Zhibin Xu, Hai Jiang i Kuan Ching Li. "A secured transmission model for EPC network". International Journal of Embedded Systems 7, nr 3/4 (2015): 324. http://dx.doi.org/10.1504/ijes.2015.072375.
Pełny tekst źródłaJayashri, N., i K. Kalaiselvi. "Secured file transmission in knowledge management-cloud". International Journal of Cloud Computing 12, nr 2/3/4 (2023): 246. http://dx.doi.org/10.1504/ijcc.2023.130901.
Pełny tekst źródłaKalaiselvi, K., i N. Jayashri. "Secured file transmission in knowledge management-cloud". International Journal of Cloud Computing 12, nr 2/3/4 (2023): 246. http://dx.doi.org/10.1504/ijcc.2023.10056013.
Pełny tekst źródłaManikandan, G., i U. Sakthi. "Chinese Remainder Theorem Based Key Management for Secured Data Transmission in Wireless Sensor Networks". Journal of Computational and Theoretical Nanoscience 17, nr 5 (1.05.2020): 2163–71. http://dx.doi.org/10.1166/jctn.2020.8864.
Pełny tekst źródłaP. Saveetha, P. Saveetha, Y. Harold Robinson P. Saveetha, Vimal Shanmuganathan Y. Harold Robinson, Seifedine Kadry Vimal Shanmuganathan i Yunyoung Nam Seifedine Kadry. "Hybrid Energy-based Secured Clustering technique for Wireless Sensor Networks". 網際網路技術學刊 23, nr 1 (styczeń 2022): 021–31. http://dx.doi.org/10.53106/160792642022012301003.
Pełny tekst źródłaSuherman, Suherman, Deddy Dikmawanto, Syafruddin Hasan i Marwan Al-Akaidi. "Embedding the three pass protocol messages into transmission control protocol header". Indonesian Journal of Electrical Engineering and Computer Science 22, nr 1 (1.04.2021): 442. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp442-449.
Pełny tekst źródłaSandip Shinde,. "Efficient Frontier Rules for Secure NFC Payments and Data Transmission". Journal of Electrical Systems 20, nr 1s (28.03.2024): 46–57. http://dx.doi.org/10.52783/jes.751.
Pełny tekst źródłaSandhyaRani, M., i T. Sivaprasad. "Implementation of Cryptographic Approach for Image Transmission with Security". International Journal of Engineering & Technology 7, nr 4.7 (27.09.2018): 311. http://dx.doi.org/10.14419/ijet.v7i4.7.20568.
Pełny tekst źródłaD. S. Sandhiya, M. V. Karthikeyan i M. Shanmuga Priya. "Secured Health Monitoring System Using AES". East Asian Journal of Multidisciplinary Research 1, nr 6 (27.07.2022): 1175–82. http://dx.doi.org/10.55927/eajmr.v1i6.577.
Pełny tekst źródłaJoshi, Jignesh, Jagdish Rathod i Kinita Wandra. "Performance Enhancement of LEACH for Secured Data Transmission". Indian Journal of Science and Technology 10, nr 20 (29.06.2017): 1–4. http://dx.doi.org/10.17485/ijst/2017/v10i19/110311.
Pełny tekst źródłaJoshi, Jignesh, Jagdish Rathod i Kinita Wandra. "Performance Enhancement of LEACH for Secured Data Transmission". Indian Journal of Science and Technology 10, nr 20 (29.06.2017): 1–4. http://dx.doi.org/10.17485/ijst/2017/v10i20/110311.
Pełny tekst źródłaRandy, B. Renil, M. Hariharan i R. Arasa Kumar. "Secured Wireless Power Transmission Using Radio Frequency Signal". International Journal of Information Sciences and Techniques 4, nr 3 (31.05.2014): 115–22. http://dx.doi.org/10.5121/ijist.2014.4315.
Pełny tekst źródłaLandu, Mahanth, i Sujatha C.N. "Secured Transmission of Text using Double Encryption Algorithms". International Journal of Engineering Trends and Technology 49, nr 5 (25.07.2017): 310–16. http://dx.doi.org/10.14445/22315381/ijett-v49p248.
Pełny tekst źródłaAl-Haj, Ali, Gheith Abandah i Noor Hussein. "Crypto-based algorithms for secured medical image transmission". IET Information Security 9, nr 6 (1.11.2015): 365–73. http://dx.doi.org/10.1049/iet-ifs.2014.0245.
Pełny tekst źródłaHemalatha, K., i Dr P. Vijayakumar. "Indexed Steep Descent Fish Optimization with Modified Certificateless Signcryption for Secured IoT Healthcare Data Transmission". International Journal of Electrical and Electronics Research 10, nr 2 (30.06.2022): 360–63. http://dx.doi.org/10.37391/ijeer.100249.
Pełny tekst źródłaAgrawal,, Jay. "Web3.0 Document Security: Leveraging Blockchain Technology". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 04 (24.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem31142.
Pełny tekst źródłaGoel, Nidhi, Balasubramanian Raman i Indra Gupta. "Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems". Advances in Multimedia 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/910106.
Pełny tekst źródłaSrinivasan, S., i C. Chandrasekar. "Adaptive File Comparison Technique for Secured Data Transmission Environment". Research Journal of Applied Sciences, Engineering and Technology 5, nr 4 (1.02.2013): 1183–86. http://dx.doi.org/10.19026/rjaset.5.4834.
Pełny tekst źródłaKenfack, Gutenbert, i Alain Tiedeu. "Secured Transmission of ECG Signals: Numerical and Electronic Simulations". Journal of Signal and Information Processing 04, nr 02 (2013): 158–69. http://dx.doi.org/10.4236/jsip.2013.42023.
Pełny tekst źródłaHamiche, Hamid, Karim Kemih, Sid Ali Addouche, Ahmad Taher Azar, Rafik Saddaoui i Mourad Laghrouche. "Hardware implementation of a new chaotic secured transmission system". International Journal of Advanced Intelligence Paradigms 20, nr 1/2 (2021): 58. http://dx.doi.org/10.1504/ijaip.2021.117609.
Pełny tekst źródłaReddy, Mittapalli Indrasena, V. Uday Kumar, K. Subba Reddy i P. Venkat Vijay Kumar. "Secured Data Transmission Using Wavelet Based Steganography And Cryptography". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 6, nr 2 (30.05.2013): 311–16. http://dx.doi.org/10.24297/ijct.v6i2.3495.
Pełny tekst źródłaSelvaraj, Priya. "A Novel approach for Secured Transmission of DICOM Images". International Journal of Advanced Intelligence Paradigms 11, nr 3-4 (2018): 1. http://dx.doi.org/10.1504/ijaip.2018.10009380.
Pełny tekst źródłaLaghrouche, Mourad, Rafik Saddaoui, Ahmad Taher Azar, Sid Ali Addouche, Hamid Hamiche i Karim Kemih. "Hardware Implementation of a New Chaotic Secured transmission System". International Journal of Advanced Intelligence Paradigms 10, nr 1 (2018): 1. http://dx.doi.org/10.1504/ijaip.2018.10023062.
Pełny tekst źródłaPriya, Selvaraj. "A novel approach for secured transmission of DICOM images". International Journal of Advanced Intelligence Paradigms 12, nr 1/2 (2019): 68. http://dx.doi.org/10.1504/ijaip.2019.096953.
Pełny tekst źródłaSahoo, G., i Rajesh Kumar Tiwari. "Some new methodologies for secured data coding and transmission". International Journal of Electronic Security and Digital Forensics 3, nr 2 (2010): 120. http://dx.doi.org/10.1504/ijesdf.2010.033781.
Pełny tekst źródłaIjeri, Sanmitra, Shivananda Pujeri, Shrikant B i Usha B A. "Image Steganography using Sudoku Puzzle for Secured Data Transmission". International Journal of Computer Applications 48, nr 17 (30.06.2012): 31–35. http://dx.doi.org/10.5120/7443-0460.
Pełny tekst źródłaMushenko, Alexey, Julia Dzuba, Alexey Nekrasov i Colin Fidge. "A Data Secured Communication System Design Procedure with a Chaotic Carrier and Synergetic Observer". Electronics 9, nr 3 (18.03.2020): 497. http://dx.doi.org/10.3390/electronics9030497.
Pełny tekst źródłaChristopher James Labrador, Gillian Claire Cancio, Krizia Dianne Congson, Kerr Jason Quevedo, Rhea Ann Verallo i James Michael Ca˜nete. "Blood Pressure Monitoring System using Remote and Secure Data Transmission". Research Briefs on Information and Communication Technology Evolution 6 (15.12.2020): 129–43. http://dx.doi.org/10.56801/rebicte.v6i.111.
Pełny tekst źródłaMunshi, Asmaa. "Improved MQTT Secure Transmission Flags in Smart Homes". Sensors 22, nr 6 (10.03.2022): 2174. http://dx.doi.org/10.3390/s22062174.
Pełny tekst źródłaSeniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle i Fahmi Fahmi. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device". Indonesian Journal of Electrical Engineering and Computer Science 22, nr 1 (1.04.2021): 507. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp507-515.
Pełny tekst źródłaMohammed Salih, Abdulkareem. "Secured Watermarking Image Using Spread Spectrum". Tikrit Journal of Engineering Sciences 23, nr 3 (31.08.2016): 71–78. http://dx.doi.org/10.25130/tjes.23.3.08.
Pełny tekst źródłaBalamurugan, P., M. Shyamala Devi i V. Sharmila. "Detecting malicious nodes using data aggregation protocols in wireless sensor networks". International Journal of Engineering & Technology 7, nr 1.1 (21.12.2017): 594. http://dx.doi.org/10.14419/ijet.v7i1.1.10365.
Pełny tekst źródłaEt. al., J. Stalin,. "Fuzzy Logic Based Secured Routing In Vanets". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, nr 11 (10.05.2021): 335–48. http://dx.doi.org/10.17762/turcomat.v12i11.5877.
Pełny tekst źródłaEt. al., Anitha S,. "Data Transmission with Improving Lifetime of Cluster Network". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, nr 2 (11.04.2021): 420–28. http://dx.doi.org/10.17762/turcomat.v12i2.827.
Pełny tekst źródłaC, Vasuki, Dr Kavitha S i Bhuvaneswari S. "A Certain Investigation on Secured and Energy Efficient Data Transmission Techniques Over Wireless Sensor Network". Webology 18, nr 05 (29.10.2021): 1226–35. http://dx.doi.org/10.14704/web/v18si05/web18303.
Pełny tekst źródłaF. M. Suaib Akhter, A., A. F. M. Shahen Shah, Mohiuddin Ahmed, Nour Moustafa, Unal Çavuşoğlu i Ahmet Zengin. "A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks". Computers, Materials & Continua 68, nr 1 (2021): 229–46. http://dx.doi.org/10.32604/cmc.2021.015447.
Pełny tekst źródłaSarkar, Arindam, i J. K. Mandal. "Secured Transmission through Multi Layer Perceptron in Wireless Communication (STMLP)". International Journal of Mobile Network Communications & Telematics 4, nr 4 (31.08.2014): 1–16. http://dx.doi.org/10.5121/ijmnct.2014.4401.
Pełny tekst źródłaXu, Min, Xiaofeng Tao, Fan Yang i Huici Wu. "Enhancing Secured Coverage With CoMP Transmission in Heterogeneous Cellular Networks". IEEE Communications Letters 20, nr 11 (listopad 2016): 2272–75. http://dx.doi.org/10.1109/lcomm.2016.2598536.
Pełny tekst źródłaPavan Kumar, A., Lingam Gajjela i N. Raghavendra Sai. "A Hybrid Hash-Stego for Secured Message Transmission Using Stegnography". IOP Conference Series: Materials Science and Engineering 981 (5.12.2020): 022014. http://dx.doi.org/10.1088/1757-899x/981/2/022014.
Pełny tekst źródłakumar, Shashi R., Anupama A. Deshponde i B. Mohankumar Naik. "Two Layer data Prediction and secured data transmission in WSN". International Journal of Engineering Trends and Technology 54, nr 4 (25.12.2017): 216–22. http://dx.doi.org/10.14445/22315381/ijett-v54p231.
Pełny tekst źródła