Search Results - (( _ application ((a algorithm) OR (based algorithm)) ) OR ( iot applications usage algorithm ))
Search alternatives:
- applications usage »
- iot applications »
- usage algorithm »
- a algorithm »
-
1
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
2
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
3
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
Get full text
Get full text
Get full text
Article -
4
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
Get full text
Get full text
Book Section -
5
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. There are four experiment conducted such as processing time, power usage, memory usage and data modification attack. …”
Get full text
Get full text
Thesis -
7
Intersection Features For Android Botnet Classification
Published 2019“…Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
Get full text
Get full text
Get full text
Article -
8
Scheduling strategy of a cloud-based virtual energy storage system (VESS) for achieving energy saving
Published 2024“…As the cost of energy storage system (ESS) remained high, the application of VESS emerges as a financially viable alternative to manage the energy consumption of flexible loads like air conditioner to reduce the energy usage. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Internet of things security vulnerabilities and recommended solutions
Published 2018“…This paper focusses on the security issues posed by large-scale heterogeneous IoT paradigm and arriving at a secure architectural framework adoptable by a variety of applications that include smart transportation, smart cities, smart healthcare, etc. based on IoT.…”
Get full text
Get full text
Get full text
Article -
10
Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap
Published 2014“…This paper is mainly interested in near real-time wireless application with regards to Internet of Things (IoT). …”
Get full text
Get full text
Article -
11
Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap
Published 2014“…This paper is mainly interested in near real-time wireless application with regards to Internet of Things (IoT). …”
Get full text
Get full text
Thesis -
12
Design and implementation of solar-powered with IoT-Enabled portable irrigation system
Published 2022“…A NodeMCU microcontroller with a Wi-Fi interface and soil moisture, temperature, and humidity sensors are exploited to monitor and control the water pump and build an IoT-based irrigation system. …”
Get full text
Get full text
Get full text
Article -
13
Design and Fabrication of Smart Home With Internet of Things Enabled Automation System
Published 2019“…A prototype called IoT@HoMe is developed with an algorithm to enable the monitoring of home conditions and automate the control of home appliances over the Internet anytime and anywhere. …”
Get full text
Get full text
Get full text
Article -
14
Design of monitoring and control system of electricity power limiter using internet of things
Published 2025“…This system uses the PZM-004T sensor to measure electricity consumption by measuring current and voltage and then sending the data via the WiFi network to a cloud server. Users can access information related to electricity usage via web-based or mobile applications that provide data display in the form of a reports. …”
Get full text
Get full text
Book Section -
15
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…The possibility for an object to communicate with others and to collect information about the environment enables a broad range of application markets. One of the main challenges in the IOT system is in the security and privacy of the generated data. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
-
18
Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system
Published 2022“…The AllThingsTalkMaker IoT server is integrated into the TTN to be accessed using Web/mobile application interfaces. …”
Get full text
Get full text
Get full text
Article -
19
Rabin-p encryption scheme analysis on MQTT
Published 2023Get full text
Get full text
Conference or Workshop Item -
20
Design and Implementation of an IoT-Enabled Smart Plug Socket for Home Energy Management
Published 2023Conference Paper
