Başlık için Mühendislik ve Mimarlık Fakültesi listeleme
Toplam kayıt 555, listelenen: 472-491
-
A seamless anonymous authentication protocol for mobile edge computing infrastructure
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2022)Mobile Edge Computing (MEC) accommodates processing and data storage and manipulation capabilities across the scope of wireless network. In MEC environment, MEC servers along with the computing and storage capabilities ... -
A secure and improved multi server authentication protocol using fuzzy commitment
(SPRINGER, VAN GODEWIJCKSTRAAT 30, 3311 GZ DORDRECHT, NETHERLANDS, 2021)The advancement in communication and computation technologies has paved a way for connecting large number of heterogeneous devices to offer specified services. Still, the advantages of this advancement are not realized ... -
A secure and lightweight authentication scheme for next generation IoT infrastructure
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)While the 6G/IoT transition is on the cards, the real advantage of this transition can be realized only if the user privacy and security are guaranteed. The smartcard and password based authentication protocols can help ... -
A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ, 2022)The rising popularity of ICT and the Internet has enabled Unmanned Aerial Vehicle (UAV) to offer advantageous assistance to Vehicular Ad-hoc Network (VANET), realizing a relay node’s role among the disconnected segments ... -
A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2020)Among other security concerns, the reliable device to device direct communication is an important research aspect in sensor cloud system application of Internet of things (IoT). The access control mechanism can ensure ... -
A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)There are innumerable ways the Internet of Drones (IoD) technology can impact our society. With the deployment of an airborne network, the IoD can support real-time low-cost delivery of services ranging from military ... -
A secure demand response management authentication scheme for smart grid
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)The electricity demands are floated through smart grid (SG) devices to a remote power management system and utility center (UC) for utilizing energy-based services, while the UCs manage the distribution of power. Nevertheless, ... -
A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks
(TECH SCIENCE PRESS, 871 CORONADO CENTER DR, SUTE 200, HENDERSON, NV 89052, 2021)Vehicular Ad hoc Networks (VANETs) become a very crucial addition in the Intelligent Transportation System (ITS). It is challenging for a VANET system to provide security services and parallelly maintain high throughput ... -
A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET
(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2021)Existing research shows that Cluster-based Medium Access Control (CB-MAC) protocols perform well in controlling and managing Vehicular Ad hoc Network (VANET), but requires ensuring improved security and privacy preserving ... -
Securing Demand Response Management: A Certificate-Based Access Control in Smart Grid Edge Computing Infrastructure
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141 USA, 2020)The edge computing infrastructure has enabled a massive amount of data in the smart grid environment by a large number of connected automated devices to be processed at the edge of the network in proximity to the data ... -
Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography
(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2019)Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats. Recently, many solutions ... -
Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141 USA, 2020)The significance of the Internet of Drones (IoD) is increasing steadily and now IoD is being practiced in many military and civilian-based applications. IoD facilitates real-time data access to the users especially the ... -
Security and Key Management in IoT Based Wireless Sensor Networks: An Authentication Protocol Using Symmetric Key
(WILEY, 111 RIVER ST, HOBOKEN 07030-5774, NJ USA, 2019)Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense various events in the surrounding environment and report back to the base station. Sensor networks are at the base of internet of things ... -
Security Hardened and Privacy Preserved Vehicle-to-Everything (V2X) Communication
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)Vehicle-to-everything (V2X) communications have recently gained concentration of researchers for both, academia as well as industry. In the V2X system, the information is communicated from vehicle sensors to other ... -
Security, Trust and Privacy for Cloud, Fog and Internet of Things
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)Internet of !ings (IoT) is a promising networking scenario in the cyber world, bridging physical devices and virtual objects. By considering the limited capacity of smart things, cloud computing is generally applied to ... -
Sensitivity Analysis in a Dengue Fever Transmission Model: A fractional order system approach
(IOP PUBLISHING LTD, DIRAC HOUSE, TEMPLE BACK, BRISTOL BS1 6BE, ENGLAND, 2019)The main purpose of the study of dengue fever transmission is to be able to determine the best approach to reduce human mortality and morbidity caused by the disease. Therefore, it is essential to identify the relative ... -
Seven Level Asymmetric Cascade Inverter with Space Vector PWM Added PR Control
(IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA, 2016)Inverters are used to convert the DC energy to AC energy for renewable energy conversation or high power industrial applications. Asymmetric inverters are preferred about their some advantages. Nowadays, control of inverters ... -
Siber Güvenlik Kapsamında Enerji Sistemleri Güvenliğinin Değerlendirilmesi
(Jandarma ve Sahil Güvenlik Akademisi, 2021)Günümüzde enerji sistemlerinde Bilgi ve İletişim Teknolojilerine (BİT) ve özellikle de İnternete olan artan oranlardaki bağımlılık, bu sistemlerde siber güvenliğin sağlanmasını zorunlu hale getirmiştir. Enerji sistemlerinde ... -
The significance of rural markets as a public space in Nigeria
(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)The signs and symbolic meanings of public space in Nigeria as perceived by the users relied on the existence of strong relationships between the people and their environment. This study centers on the users’ articulatio ... -
Simple Mathematical and Simulink Model of Stepper Motor
(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2022)This paper presents a simple mathematical and Simulink model of a two-phase hybrid stepper motor, where ignoring the permeance space harmonics of the hybrid stepper motor is regarded as the main physical assumption in ...