Статті в журналах з теми "Secured transmission"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Secured transmission".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
E, Kanniga. "Huffman Algorithm for Secured Data Transmission." International Journal of Psychosocial Rehabilitation 23, no. 3 (July 30, 2019): 456–63. http://dx.doi.org/10.37200/ijpr/v23i3/pr190143.
Повний текст джерелаDebita, Grzegorz, Przemysław Falkowski-Gilski, Marcin Habrych, Bogdan Miedziński, Jan Wandzio, and Przemysław Jedlikowski. "Secured wired BPL voice transmission system." Scientific Journal of the Military University of Land Forces 198, no. 4 (December 15, 2020): 947–55. http://dx.doi.org/10.5604/01.3001.0014.6065.
Повний текст джерелаNarmadha., R. P. "OVERLAPPED WATERMARKING FOR SECURED DATA TRANSMISSION." International Journal of Advanced Research 4, no. 5 (May 31, 2016): 940–45. http://dx.doi.org/10.21474/ijar01/535.
Повний текст джерелаSultana, Jeenat, and Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 4412. http://dx.doi.org/10.11591/ijece.v8i6.pp4412-4422.
Повний текст джерелаSrinivasan, P., A. Kannagi, and P. Rajendiran. "Laplace Angular Displaced Secure Data Transmission for Internet of Things Based Health Care Systems." Journal of Medical Imaging and Health Informatics 11, no. 11 (November 1, 2021): 2868–74. http://dx.doi.org/10.1166/jmihi.2021.3883.
Повний текст джерелаEt.al, G. Aparna. "A Watermark Approach for Image Transmission: Implementation of Channel Coding Technique with Security." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 3976–84. http://dx.doi.org/10.17762/turcomat.v12i3.1687.
Повний текст джерелаPadmaja, P., and G. V. Marutheswar. "Certain Investigation on Secured Data Transmission in Wireless Sensor Networks." International Journal of Mobile Computing and Multimedia Communications 8, no. 1 (January 2017): 48–61. http://dx.doi.org/10.4018/ijmcmc.2017010104.
Повний текст джерелаKARTHIKEYAN, A., and GOKUL S. SAI. "SECURED WIRELESS TRANSMISSION PROTOCOL USING NTP SERVER." i-manager’s Journal on Wireless Communication Networks 6, no. 4 (2018): 38. http://dx.doi.org/10.26634/jwcn.6.4.14294.
Повний текст джерелаpandey, K. S. Abitha, Anjali. "Secured Data Transmission Using Elliptic Curve Cryptography." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 03 (March 30, 2015): 1419–25. http://dx.doi.org/10.15680/ijircce.2015.0303003.
Повний текст джерелаSundarraj, P. Daniel. "SECURED DATA TRANSMISSION IN MOBILE ADHOC NETWORKS." International Journal of Advanced Research in Computer Science 8, no. 9 (September 30, 2017): 422–24. http://dx.doi.org/10.26483/ijarcs.v8i9.5100.
Повний текст джерелаLi, Zhongwen, Qian Li, Zhibin Xu, Hai Jiang, and Kuan Ching Li. "A secured transmission model for EPC network." International Journal of Embedded Systems 7, no. 3/4 (2015): 324. http://dx.doi.org/10.1504/ijes.2015.072375.
Повний текст джерелаJayashri, N., and K. Kalaiselvi. "Secured file transmission in knowledge management-cloud." International Journal of Cloud Computing 12, no. 2/3/4 (2023): 246. http://dx.doi.org/10.1504/ijcc.2023.130901.
Повний текст джерелаKalaiselvi, K., and N. Jayashri. "Secured file transmission in knowledge management-cloud." International Journal of Cloud Computing 12, no. 2/3/4 (2023): 246. http://dx.doi.org/10.1504/ijcc.2023.10056013.
Повний текст джерелаManikandan, G., and U. Sakthi. "Chinese Remainder Theorem Based Key Management for Secured Data Transmission in Wireless Sensor Networks." Journal of Computational and Theoretical Nanoscience 17, no. 5 (May 1, 2020): 2163–71. http://dx.doi.org/10.1166/jctn.2020.8864.
Повний текст джерелаP. Saveetha, P. Saveetha, Y. Harold Robinson P. Saveetha, Vimal Shanmuganathan Y. Harold Robinson, Seifedine Kadry Vimal Shanmuganathan, and Yunyoung Nam Seifedine Kadry. "Hybrid Energy-based Secured Clustering technique for Wireless Sensor Networks." 網際網路技術學刊 23, no. 1 (January 2022): 021–31. http://dx.doi.org/10.53106/160792642022012301003.
Повний текст джерелаSuherman, Suherman, Deddy Dikmawanto, Syafruddin Hasan, and Marwan Al-Akaidi. "Embedding the three pass protocol messages into transmission control protocol header." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 442. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp442-449.
Повний текст джерелаSandip Shinde,. "Efficient Frontier Rules for Secure NFC Payments and Data Transmission." Journal of Electrical Systems 20, no. 1s (March 28, 2024): 46–57. http://dx.doi.org/10.52783/jes.751.
Повний текст джерелаSandhyaRani, M., and T. Sivaprasad. "Implementation of Cryptographic Approach for Image Transmission with Security." International Journal of Engineering & Technology 7, no. 4.7 (September 27, 2018): 311. http://dx.doi.org/10.14419/ijet.v7i4.7.20568.
Повний текст джерелаD. S. Sandhiya, M. V. Karthikeyan, and M. Shanmuga Priya. "Secured Health Monitoring System Using AES." East Asian Journal of Multidisciplinary Research 1, no. 6 (July 27, 2022): 1175–82. http://dx.doi.org/10.55927/eajmr.v1i6.577.
Повний текст джерелаJoshi, Jignesh, Jagdish Rathod, and Kinita Wandra. "Performance Enhancement of LEACH for Secured Data Transmission." Indian Journal of Science and Technology 10, no. 20 (June 29, 2017): 1–4. http://dx.doi.org/10.17485/ijst/2017/v10i19/110311.
Повний текст джерелаJoshi, Jignesh, Jagdish Rathod, and Kinita Wandra. "Performance Enhancement of LEACH for Secured Data Transmission." Indian Journal of Science and Technology 10, no. 20 (June 29, 2017): 1–4. http://dx.doi.org/10.17485/ijst/2017/v10i20/110311.
Повний текст джерелаRandy, B. Renil, M. Hariharan, and R. Arasa Kumar. "Secured Wireless Power Transmission Using Radio Frequency Signal." International Journal of Information Sciences and Techniques 4, no. 3 (May 31, 2014): 115–22. http://dx.doi.org/10.5121/ijist.2014.4315.
Повний текст джерелаLandu, Mahanth, and Sujatha C.N. "Secured Transmission of Text using Double Encryption Algorithms." International Journal of Engineering Trends and Technology 49, no. 5 (July 25, 2017): 310–16. http://dx.doi.org/10.14445/22315381/ijett-v49p248.
Повний текст джерелаAl-Haj, Ali, Gheith Abandah, and Noor Hussein. "Crypto-based algorithms for secured medical image transmission." IET Information Security 9, no. 6 (November 1, 2015): 365–73. http://dx.doi.org/10.1049/iet-ifs.2014.0245.
Повний текст джерелаHemalatha, K., and Dr P. Vijayakumar. "Indexed Steep Descent Fish Optimization with Modified Certificateless Signcryption for Secured IoT Healthcare Data Transmission." International Journal of Electrical and Electronics Research 10, no. 2 (June 30, 2022): 360–63. http://dx.doi.org/10.37391/ijeer.100249.
Повний текст джерелаAgrawal,, Jay. "Web3.0 Document Security: Leveraging Blockchain Technology." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 24, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31142.
Повний текст джерелаGoel, Nidhi, Balasubramanian Raman, and Indra Gupta. "Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems." Advances in Multimedia 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/910106.
Повний текст джерелаSrinivasan, S., and C. Chandrasekar. "Adaptive File Comparison Technique for Secured Data Transmission Environment." Research Journal of Applied Sciences, Engineering and Technology 5, no. 4 (February 1, 2013): 1183–86. http://dx.doi.org/10.19026/rjaset.5.4834.
Повний текст джерелаKenfack, Gutenbert, and Alain Tiedeu. "Secured Transmission of ECG Signals: Numerical and Electronic Simulations." Journal of Signal and Information Processing 04, no. 02 (2013): 158–69. http://dx.doi.org/10.4236/jsip.2013.42023.
Повний текст джерелаHamiche, Hamid, Karim Kemih, Sid Ali Addouche, Ahmad Taher Azar, Rafik Saddaoui, and Mourad Laghrouche. "Hardware implementation of a new chaotic secured transmission system." International Journal of Advanced Intelligence Paradigms 20, no. 1/2 (2021): 58. http://dx.doi.org/10.1504/ijaip.2021.117609.
Повний текст джерелаReddy, Mittapalli Indrasena, V. Uday Kumar, K. Subba Reddy, and P. Venkat Vijay Kumar. "Secured Data Transmission Using Wavelet Based Steganography And Cryptography." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 6, no. 2 (May 30, 2013): 311–16. http://dx.doi.org/10.24297/ijct.v6i2.3495.
Повний текст джерелаSelvaraj, Priya. "A Novel approach for Secured Transmission of DICOM Images." International Journal of Advanced Intelligence Paradigms 11, no. 3-4 (2018): 1. http://dx.doi.org/10.1504/ijaip.2018.10009380.
Повний текст джерелаLaghrouche, Mourad, Rafik Saddaoui, Ahmad Taher Azar, Sid Ali Addouche, Hamid Hamiche, and Karim Kemih. "Hardware Implementation of a New Chaotic Secured transmission System." International Journal of Advanced Intelligence Paradigms 10, no. 1 (2018): 1. http://dx.doi.org/10.1504/ijaip.2018.10023062.
Повний текст джерелаPriya, Selvaraj. "A novel approach for secured transmission of DICOM images." International Journal of Advanced Intelligence Paradigms 12, no. 1/2 (2019): 68. http://dx.doi.org/10.1504/ijaip.2019.096953.
Повний текст джерелаSahoo, G., and Rajesh Kumar Tiwari. "Some new methodologies for secured data coding and transmission." International Journal of Electronic Security and Digital Forensics 3, no. 2 (2010): 120. http://dx.doi.org/10.1504/ijesdf.2010.033781.
Повний текст джерелаIjeri, Sanmitra, Shivananda Pujeri, Shrikant B, and Usha B A. "Image Steganography using Sudoku Puzzle for Secured Data Transmission." International Journal of Computer Applications 48, no. 17 (June 30, 2012): 31–35. http://dx.doi.org/10.5120/7443-0460.
Повний текст джерелаMushenko, Alexey, Julia Dzuba, Alexey Nekrasov, and Colin Fidge. "A Data Secured Communication System Design Procedure with a Chaotic Carrier and Synergetic Observer." Electronics 9, no. 3 (March 18, 2020): 497. http://dx.doi.org/10.3390/electronics9030497.
Повний текст джерелаChristopher James Labrador, Gillian Claire Cancio, Krizia Dianne Congson, Kerr Jason Quevedo, Rhea Ann Verallo, and James Michael Ca˜nete. "Blood Pressure Monitoring System using Remote and Secure Data Transmission." Research Briefs on Information and Communication Technology Evolution 6 (December 15, 2020): 129–43. http://dx.doi.org/10.56801/rebicte.v6i.111.
Повний текст джерелаMunshi, Asmaa. "Improved MQTT Secure Transmission Flags in Smart Homes." Sensors 22, no. 6 (March 10, 2022): 2174. http://dx.doi.org/10.3390/s22062174.
Повний текст джерелаSeniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahmi. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 507. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp507-515.
Повний текст джерелаMohammed Salih, Abdulkareem. "Secured Watermarking Image Using Spread Spectrum." Tikrit Journal of Engineering Sciences 23, no. 3 (August 31, 2016): 71–78. http://dx.doi.org/10.25130/tjes.23.3.08.
Повний текст джерелаBalamurugan, P., M. Shyamala Devi, and V. Sharmila. "Detecting malicious nodes using data aggregation protocols in wireless sensor networks." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 594. http://dx.doi.org/10.14419/ijet.v7i1.1.10365.
Повний текст джерелаEt. al., J. Stalin,. "Fuzzy Logic Based Secured Routing In Vanets." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 11 (May 10, 2021): 335–48. http://dx.doi.org/10.17762/turcomat.v12i11.5877.
Повний текст джерелаEt. al., Anitha S,. "Data Transmission with Improving Lifetime of Cluster Network." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 420–28. http://dx.doi.org/10.17762/turcomat.v12i2.827.
Повний текст джерелаC, Vasuki, Dr Kavitha S, and Bhuvaneswari S. "A Certain Investigation on Secured and Energy Efficient Data Transmission Techniques Over Wireless Sensor Network." Webology 18, no. 05 (October 29, 2021): 1226–35. http://dx.doi.org/10.14704/web/v18si05/web18303.
Повний текст джерелаF. M. Suaib Akhter, A., A. F. M. Shahen Shah, Mohiuddin Ahmed, Nour Moustafa, Unal Çavuşoğlu, and Ahmet Zengin. "A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks." Computers, Materials & Continua 68, no. 1 (2021): 229–46. http://dx.doi.org/10.32604/cmc.2021.015447.
Повний текст джерелаSarkar, Arindam, and J. K. Mandal. "Secured Transmission through Multi Layer Perceptron in Wireless Communication (STMLP)." International Journal of Mobile Network Communications & Telematics 4, no. 4 (August 31, 2014): 1–16. http://dx.doi.org/10.5121/ijmnct.2014.4401.
Повний текст джерелаXu, Min, Xiaofeng Tao, Fan Yang, and Huici Wu. "Enhancing Secured Coverage With CoMP Transmission in Heterogeneous Cellular Networks." IEEE Communications Letters 20, no. 11 (November 2016): 2272–75. http://dx.doi.org/10.1109/lcomm.2016.2598536.
Повний текст джерелаPavan Kumar, A., Lingam Gajjela, and N. Raghavendra Sai. "A Hybrid Hash-Stego for Secured Message Transmission Using Stegnography." IOP Conference Series: Materials Science and Engineering 981 (December 5, 2020): 022014. http://dx.doi.org/10.1088/1757-899x/981/2/022014.
Повний текст джерелаkumar, Shashi R., Anupama A. Deshponde, and B. Mohankumar Naik. "Two Layer data Prediction and secured data transmission in WSN." International Journal of Engineering Trends and Technology 54, no. 4 (December 25, 2017): 216–22. http://dx.doi.org/10.14445/22315381/ijett-v54p231.
Повний текст джерела