Başlık için Web of Science ve Scopus Atıf Dizinlerindeki Yayınlar listeleme
Toplam kayıt 373, listelenen: 313-332
-
A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)There are innumerable ways the Internet of Drones (IoD) technology can impact our society. With the deployment of an airborne network, the IoD can support real-time low-cost delivery of services ranging from military ... -
A secure demand response management authentication scheme for smart grid
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)The electricity demands are floated through smart grid (SG) devices to a remote power management system and utility center (UC) for utilizing energy-based services, while the UCs manage the distribution of power. Nevertheless, ... -
A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks
(TECH SCIENCE PRESS, 871 CORONADO CENTER DR, SUTE 200, HENDERSON, NV 89052, 2021)Vehicular Ad hoc Networks (VANETs) become a very crucial addition in the Intelligent Transportation System (ITS). It is challenging for a VANET system to provide security services and parallelly maintain high throughput ... -
A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET
(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2021)Existing research shows that Cluster-based Medium Access Control (CB-MAC) protocols perform well in controlling and managing Vehicular Ad hoc Network (VANET), but requires ensuring improved security and privacy preserving ... -
Securing Demand Response Management: A Certificate-Based Access Control in Smart Grid Edge Computing Infrastructure
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141 USA, 2020)The edge computing infrastructure has enabled a massive amount of data in the smart grid environment by a large number of connected automated devices to be processed at the edge of the network in proximity to the data ... -
Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography
(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2019)Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats. Recently, many solutions ... -
Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141 USA, 2020)The significance of the Internet of Drones (IoD) is increasing steadily and now IoD is being practiced in many military and civilian-based applications. IoD facilitates real-time data access to the users especially the ... -
Security and Key Management in IoT Based Wireless Sensor Networks: An Authentication Protocol Using Symmetric Key
(WILEY, 111 RIVER ST, HOBOKEN 07030-5774, NJ USA, 2019)Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense various events in the surrounding environment and report back to the base station. Sensor networks are at the base of internet of things ... -
Security Hardened and Privacy Preserved Vehicle-to-Everything (V2X) Communication
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)Vehicle-to-everything (V2X) communications have recently gained concentration of researchers for both, academia as well as industry. In the V2X system, the information is communicated from vehicle sensors to other ... -
Security, Trust and Privacy for Cloud, Fog and Internet of Things
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)Internet of !ings (IoT) is a promising networking scenario in the cyber world, bridging physical devices and virtual objects. By considering the limited capacity of smart things, cloud computing is generally applied to ... -
Sensitivity Analysis in a Dengue Fever Transmission Model: A fractional order system approach
(IOP PUBLISHING LTD, DIRAC HOUSE, TEMPLE BACK, BRISTOL BS1 6BE, ENGLAND, 2019)The main purpose of the study of dengue fever transmission is to be able to determine the best approach to reduce human mortality and morbidity caused by the disease. Therefore, it is essential to identify the relative ... -
Seven Level Asymmetric Cascade Inverter with Space Vector PWM Added PR Control
(IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA, 2016)Inverters are used to convert the DC energy to AC energy for renewable energy conversation or high power industrial applications. Asymmetric inverters are preferred about their some advantages. Nowadays, control of inverters ... -
The significance of rural markets as a public space in Nigeria
(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)The signs and symbolic meanings of public space in Nigeria as perceived by the users relied on the existence of strong relationships between the people and their environment. This study centers on the users’ articulatio ... -
Simple Mathematical and Simulink Model of Stepper Motor
(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2022)This paper presents a simple mathematical and Simulink model of a two-phase hybrid stepper motor, where ignoring the permeance space harmonics of the hybrid stepper motor is regarded as the main physical assumption in ... -
Simulation study of solar-source heat pump system with sensible energy storage
(SPRINGER, VAN GODEWIJCKSTRAAT 30, 3311 GZ DORDRECHT, NETHERLANDS, 2021)A simulation study of the solar-source heat pump (SSHP) system that consists of solar collector group, heat exchanger (waterto-water), energy storage tank, heat pump with vapor compression and circulating pumps is carried ... -
Sinc-Galerkin Method for Approximate Solutions of Fractional Order Boundary Value Problems
(SpringerOpen, 2013-12-30)In this paper we present an approximate solution of a fractional order two-point boundary value problem (FBVP). We use the sinc-Galerkin method that has almost not been employed for the fractional order differential ... -
Sixth Generation (6G) Wireless Networks: Vision, Research Activities, Challenges and Potential Solutions
(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2020)The standardization activities of the fifth generation communications are clearly over and deployment has commenced globally. To sustain the competitive edge of wireless networks, industrial and academia synergy have ... -
Size dependent bending analysis of two directional functionally graded microbeams via a quasi-3D theory and finite element method
(ELSEVIER SCI LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND, 2018)This paper presents the flexural behaviour of two directional functionally graded (2D-FG) microbeams subjected to uniformly distributed load with various boundary conditions. A four-unknown shear and normal deformation theory ... -
SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)Being one of the finest applications of the IoT, smart homes (SHs) with an aim to improve quality of life are taking over the traditional lifestyles. The entities within a SH communicate with each other and with the ... -
Solar Powered Hybrid Multilevel Inverter Fed Induction Motor Using Fuzzy Proportional Integral Speed Controller
(VINCA INST NUCLEAR SCI, MIHAJLA PETROVICA-ALASA 12-14 VINCA, 11037 BELGRADE. POB 522, BELGRADE, 11001, SERBIA, 2019)In this paper, speed control of solar powered single phase hybrid multilevel inverter fed induction motor using fuzzy proportional integral controller is proposed. The proposed control system has been developed using ...