Search
Search Results
Found 2 items.
1 - 2 of 2 items
Abstract:
The Internet of Things devices and users exchange massive amount of data. Some of these exchanged messages are highly sensitive as they involve organizational, military or patient personally identifiable information. Therefore, many schemes and protocols have been put forward to protect the transmitted messages. The techniques deployed in these schemes may include blockchain, public... More
Abstract:
The advancement in cellular communications has enhanced the special attention given to the study of resource allocation schemes. This study is to enhance communications to attain efficiency and thereby offers fairness to all users in the face of congestion experienced anytime a new product is rolled out. The comparative analysis was done on the... More