Search Results - (( _ application need algorithm ) OR ( iot application design algorithm ))*

Refine Results
  1. 1

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…In conclusion, the SHA-3 with smaller area and higher performance has been designed and is possible to cater the needs of IoT application.…”
    Get full text
    Get full text
    Thesis
  2. 2

    An efficient IoT-based smart water meter system of smart city environment by Al-Madhrahi, R., Abdullah, J., Alduais, N. A. M., Mahdin, H.B., Saad, A. -M. H. Y., Nasser, A. B., Alduais, H. S.

    Published 2021
    “…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Water quality monitoring using machine learning and IoT: a review by Hasan, Tahsin Fuad, Kabbashi, Nassereldeen Ahmed, Saleh, Tanveer, Alam, Md. Zahangir, Abd Wahab, Mohd Firdaus, Nour, Abdurahman Hamid

    Published 2024
    “…The paper explores various ML algorithms, including supervised and unsupervised learning and deep learning, along with their applications, and discusses the use of IoT sensors for real-time monitoring of water quality parameters such as pH, dissolved oxygen, temperature, and turbidity.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN by Ibrahim, Nurul Saliha Amani

    Published 2022
    “…Due to finite resource, multiple issues need to be considered in designing such system, including AG flight time, coverage radius and the achievable data rate of the ground-to-air system, thus an Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System by Chiadighikaobi, Ikenna Rene

    Published 2024
    “…However, the limitations of IoT devices have led to computation cost challenges and the need for a lightweight authentication scheme. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Faulty sensor detection using data correlation of multivariant sensor reading in smart agriculture with IOT by Malik, Ahmed Dhahir

    Published 2019
    “…The accuracy of the algorithm for data correlation may be changing depending on the application that wants to detect the faulty sensor in the system and according to how many data that income to the microcontroller per minute and how many data should take to calculate the correlation coefficient. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions by Adday, Ghaihab Hassan, K. Subramaniam, Shamala, Ahmad Zukarnain, Zuriati, Samian, Normalia

    Published 2022
    “…Thus, the respective underlying Fault Tolerance (FT) structure is a critical requirement that needs to be considered when designing any algorithm in WSNs. …”
    Get full text
    Get full text
    Article
  14. 14

    DESIGN OF SMART TRAFFIC LIGHT SYSTEM BASED ON INTERNET OF THINGS by MUHAMMAD AMIR AFIQ, MOHAMED

    Published 2018
    “…In this paper, the design of the smart traffic light system is proposed based the Internet of Thing (IoT). …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  15. 15
  16. 16

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Internet of wearable things-based on lora and wi-fi healthcare monitoring system for medical applications by Suliman Abdulmalek, Hamood Ahmed

    Published 2024
    “…The thesis presents the design and development of an Internet of Wearable Things-based on Lora and Wi-Fi Healthcare Monitoring System (IoWT-LWHMS) for medical applications, which includes the development of an IoWT-based healthcare system utilizing wearable sensing units for remotely and conveniently monitoring patients' health conditions such as Blood Pressure (BP), Heart Rate (HR), and Body Temperature (BT) in real-time and development of a LoRa and Wi-Fi networks for IoWT-LWHMS to support short-and long-range connectivity using the FiPy microcontroller with an integrated algorithm for data acquisition and update to the IoT platform. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…In this paper, an ant colony optimization (ACO) based WSN routing algorithm for IoT has been proposed and analyzed to enhance scalability, to accommodate node mobility and to minimize initialization delay for time critical applications in the context of IoT to find the optimal path of data transmission, improvising efficient IoT communications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article