Discover more insights into Data Transmitted

Keywords frequently search together with Data Transmitted

Narrow sentence examples with built-in keyword filters

Data Transmitted sentence examples within Sensor Data Transmitted



Optimal Unbiased Linear Sensor Fusion over Multiple Lossy Channels with Collective Observability



An Extended Business Process Representation for Integrating IoT Based on SWRL/OWL


Data Transmitted sentence examples within Medical Data Transmitted



Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems



Network Selection for Maximum Coverage using Regression Analysis in Deep Fading Environment


Data Transmitted sentence examples within Sensitive Data Transmitted



Secure Patient Authentication Framework in the Healthcare System Using Wireless Medical Sensor Networks



Jointly optimization for activity recognition in secure IoT-enabled elderly care applications




Data Transmitted sentence examples within Protect Data Transmitted



Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks



Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN)


Data Transmitted sentence examples within Measurement Data Transmitted



Security Analysis for Dynamic State Estimation of Power Systems With Measurement Delays.



An Output-Coding-Based Detection Scheme Against Replay Attacks in Cyber-Physical Systems


Data Transmitted sentence examples within Signal Data Transmitted



Adaptive Beamforming for Multiple-Access Millimeter Wave Communications : Invited Presentation



Prediction of signal data parameters in land-satellite communication links with fading


Data Transmitted sentence examples within Experimental Data Transmitted



Coherent Multicarrier Receiver for Mobile Acoustic Channels



Low-Complexity Superresolution Frequency Offset Estimation for High Data Rate Acoustic OFDM Systems


Data Transmitted sentence examples within Monitoring Data Transmitted



Multi-sink distributed power control algorithm for Cyber-physical-systems in coal mine tunnels



Research and Design of Cable Partial Discharge Online Monitoring Technology Based on GPS Clock Wireless Synchronization


Data Transmitted sentence examples within User Data Transmitted



Enhancing Branch Office Network Availability Using Cloud EoIP Gateway



A Comparative Study of User Data Security and Privacy in Native and Cross Platform Android Mobile Banking Applications


Data Transmitted sentence examples within Redundant Data Transmitted



Context-aware Data Operation Strategies in Edge Systems for High Application Performance



A Spatial-Temporal Correlation Approach for Data Reduction in Cluster-Based Sensor Networks


Data Transmitted sentence examples within Telemetry Data Transmitted



Unmanned Aircraft System for Andean Volcano monitoring and surveillance



Crash Telemetry-Based Injury Severity Prediction is Equivalent to or Out-Performs Field Protocols in Triage of Planar Vehicle Collisions.


Data Transmitted sentence examples within Total Data Transmitted



Optimized Clustering With Data Privacy For Wireless Sensor Network Data Transmission



Scheduling users in drive-thru Internet: a multi-armed bandit approach


Data Transmitted sentence examples within data transmitted vium



Wildlife Monitoring on the Edge: A Performance Evaluation of Embedded Neural Networks on Microcontrollers for Animal Behavior Classification



IoT: A Revolutionizing Step for Pharmaceutical Supply Chain Management During and After Covid19


Data Transmitted sentence examples within data transmitted among



Multiple error correction towards optimisation of energy in sensor network



Value-based utility implementation in software-defined testbed for sensor data traffic management


Data Transmitted sentence examples within data transmitted wirelessly



Novel Design of AC Motor Powered Smart Wheel Chair



NDE and SHM in the Age of Industry 4.0


Data Transmitted sentence examples within data transmitted acros



Proposed Access Control Architecture Based on Fog Computing for IoT Environments



A Lightweight Blockchain Based Framework for Underwater IoT


Data Transmitted sentence examples within data transmitted back



Short-circuit current processing method in space calibration of “twin” solar cells



Application of Radio-Finger Augmented Devices to Cognitive Neural remapping



Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models



BBNet: A Novel Convolutional Neural Network Structure in Edge-Cloud Collaborative Inference


More Data Transmitted sentence examples
10.3390/cryptography5040029

On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications



Alignment and integration off-axis mirrors for space applications


More Data Transmitted sentence examples
10.1109/ACCESS.2021.3054630

An Efficient Data Aggregation Scheme Based on Differentiated Threshold Configuring Joint Optimal Relay Selection in WSNs


More Data Transmitted sentence examples
10.1109/ICCES51350.2021.9489090

On-The-Fly Key Generation Based VLSI Implementation of Advanced Encryption Standard


More Data Transmitted sentence examples
10.1016/J.IJEPES.2021.106819

Machine learning based false data injection in smart grid



Use of firefly optimization algorithm for fractional fourier transform based reversible data hiding


More Data Transmitted sentence examples
10.1088/1755-1315/857/1/012013

Development of a system for operational monitoring of the soil agrochemical indicators


More Data Transmitted sentence examples
10.1007/S00521-021-06156-7

Optimizing the end-to-end transmission scheme for hybrid satellite and multihop networks


More Data Transmitted sentence examples
10.1109/ICCCS52626.2021.9449143

Joint Coding Scheme Based on Reed-Solomon Codes



Effective Content Delivery with Distributed Edge Caching in WiFi Networks


More Data Transmitted sentence examples
10.17762/TURCOMAT.V12I10.4865

New Lightweight Hybrid Encryption Algorithm for Cloud Computing (LMGHA-128bit) by using new 5-D hyperchaos system


More Data Transmitted sentence examples
10.1109/ACCESS.2021.3095618

Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications


More Data Transmitted sentence examples
10.1109/IEEECONF51389.2021.9416112

Algorithm for Building a Cluster for Implementing the “Memory as a Service” Service in the IoT Concept


More Data Transmitted sentence examples
10.1088/1742-6596/1755/1/012046

Donut Modes in Space Wavelength Division Multiplexing: Multimode Optical Fiber Transmission based on Electrical Feedback Equalizer


More Data Transmitted sentence examples
10.1080/10919392.2020.1831870

Securing IoT Devices Using Zero Trust and Blockchain


More Data Transmitted sentence examples
10.1109/JIOT.2021.3089327

Spatial Reuse Based Efficient Coexistence for Cellular and WiFi Systems in the Unlicensed Band


More Data Transmitted sentence examples
10.1109/WTS51064.2021.9433681

Efficient Data Gathering from Passive Wireless Sensor Networks


More Data Transmitted sentence examples
10.1007/s00034-020-01585-6

Robust and Secure Video Watermarking Based on Cellular Automata and Singular Value Decomposition for Copyright Protection


More Data Transmitted sentence examples
10.1088/1361-6501/ac2316

Application of compressed sensing in the guided wave structural health monitoring of switch rails


More Data Transmitted sentence examples
10.1109/CCCI52664.2021.9583190

XAI-AV: Explainable Artificial Intelligence for Trust Management in Autonomous Vehicles


More Data Transmitted sentence examples
10.47392/IRJASH.2020.265

Soldiers health monitoring and tracking system using IOT and UAV


More Data Transmitted sentence examples
10.1088/1757-899X/1166/1/012042

Implementation of MIMO OFDM NOMA System using Iterative Algorithm



Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model


More Data Transmitted sentence examples
10.1002/9781119593584.CH5

Lightweight Privacy‐Preserving Learning Schemes*


More Data Transmitted sentence examples
10.22075/IJNAA.2021.5368

Trust based blockchain security management in edge computing



Feature-Selection and Mutual-Clustering Approaches to Improve DoS Detection and Maintain WSNs’ Lifetime


More Data Transmitted sentence examples
10.1109/ICCIA52082.2021.9403591

Secure Centralized Kalman Filter for Network Environments by Homomorphic Encryption


More Data Transmitted sentence examples
10.1109/ACCESS.2021.3112554

Novel ECC-Based RFID Mutual Authentication Protocol for Emerging IoT Applications



FPGA IMPLEMENTATION OF MODIFIED ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM


More Data Transmitted sentence examples
10.1109/ACCESS.2019.2915385

An Efficient Information Maximization Based Adaptive Congestion Control Scheme in Wireless Sensor Network


More Data Transmitted sentence examples
10.1109/ITCE.2019.8646397

Secure Transmission of Space Images using Joint Encryption Compression


More Data Transmitted sentence examples
10.1145/3349341.3349369

Design and Implementation of the Single-Block Hash FunctionBased on S-box


More Data Transmitted sentence examples
10.1109/DASC43569.2019.9081721

An Algorithm to Determine Airport Runway Usage/Configuration Based on Aircraft Trajectories


More Data Transmitted sentence examples
10.1109/EICONRUS.2019.8656749

Network Graph Datastore Using DISC Processor



Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules


More Data Transmitted sentence examples
10.1145/3349341.3349514

Enlightenment of Cross-Border Data Security and Personal Privacy Protection Measures of Europe and the United States for China


More Data Transmitted sentence examples
10.1007/978-3-030-30143-9_1

Automatic Maritime Traffic Synthetic Route: A Framework for Route Prediction


More Data Transmitted sentence examples
10.1109/ComComAp46287.2019.9018817

Secure Transmission for Buffer-Aided Relay Networks with Delay Constraints



A lightweight anonymous mutual authentication and key agreement scheme for WBAN


More Data Transmitted sentence examples
10.1016/J.MEASUREMENT.2019.106890

Low voltage smart meter for monitoring of power quality disturbances applied in smart grid



Design and Implementation of an Integrated IoT Blockchain Platform for Sensing Data Integrity


More Data Transmitted sentence examples
10.1109/CDC40024.2019.9029366

Attack-Resilient Supervisory Control with Intermittently Secure Communication


More Data Transmitted sentence examples
10.1109/ETFA.2019.8869536

Compressible Source Separation in Industrial IoT Broadband Communication


More Data Transmitted sentence examples
10.1088/1748-0221/14/11/t11003

Digitizer for a thermal neutron detector array


More Data Transmitted sentence examples
10.1007/s11042-019-08333-2

Energy-efficient secured data reduction technique using image difference function in wireless video sensor networks


More Data Transmitted sentence examples
10.3390/proceedings2019015046

Object Tracking Based on (m,k)-firm Model in Multimedia Wireless Sensor Networks


More Data Transmitted sentence examples
10.1109/IGARSS.2019.8900574

Intelligent Onboard Processing and Multichannel Transmission Technology for Infrared Remote Sensing Data


More Data Transmitted sentence examples
10.1016/J.ADHOC.2019.101898

Emergency aware congestion control for smart grid neighborhood area networks


More Data Transmitted sentence examples
10.1145/3372938.3372963

Comparison between Objective functions standards and OF-EHE for RPL Routing Protocol


More Data Transmitted sentence examples
10.1007/978-3-030-33723-0_40

Cross-Media Sentiment Analysis in Brazilian Blogs


More Data Transmitted sentence examples
10.1007/S00500-019-04016-0

Super-imposed cluster embedding for ring routing path identification in WSN


More Data Transmitted sentence examples
10.1109/PERCOM.2019.8767411

Do You See What I See?Detecting Hidden Streaming Cameras Through Similarity of Simultaneous Observation


More Data Transmitted sentence examples
10.23977/IOTEA.2019.41002

Research on Privacy Protection Scheme Based on Certificateless Aggregation Signcryption in AMI



Data Transmitted
Encyclopedia