Search Results - (( _ application need algorithm ) OR ( iot application designing algorithm ))*
Search alternatives:
- application designing »
- designing algorithm »
- application need »
- iot application »
- need algorithm »
-
1
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…In conclusion, the SHA-3 with smaller area and higher performance has been designed and is possible to cater the needs of IoT application.…”
Get full text
Get full text
Thesis -
2
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
3
Water quality monitoring using machine learning and IoT: a review
Published 2024“…The paper explores various ML algorithms, including supervised and unsupervised learning and deep learning, along with their applications, and discusses the use of IoT sensors for real-time monitoring of water quality parameters such as pH, dissolved oxygen, temperature, and turbidity.…”
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
6
Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN
Published 2022“…Due to finite resource, multiple issues need to be considered in designing such system, including AG flight time, coverage radius and the achievable data rate of the ground-to-air system, thus an Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
Published 2024“…However, the limitations of IoT devices have led to computation cost challenges and the need for a lightweight authentication scheme. …”
Get full text
Get full text
Get full text
Thesis -
9
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…The major issue in the design of a security system in IOT is in the device layer. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Faulty sensor detection using data correlation of multivariant sensor reading in smart agriculture with IOT
Published 2019“…The accuracy of the algorithm for data correlation may be changing depending on the application that wants to detect the faulty sensor in the system and according to how many data that income to the microcontroller per minute and how many data should take to calculate the correlation coefficient. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Evaluation of Security Metric for Artificial Internet of Things Smart Locking System
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
13
Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions
Published 2022“…Thus, the respective underlying Fault Tolerance (FT) structure is a critical requirement that needs to be considered when designing any algorithm in WSNs. …”
Get full text
Get full text
Article -
14
DESIGN OF SMART TRAFFIC LIGHT SYSTEM BASED ON INTERNET OF THINGS
Published 2018“…In this paper, the design of the smart traffic light system is proposed based the Internet of Thing (IoT). …”
Get full text
Get full text
Final Year Project Report / IMRAD -
15
-
16
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. …”
Get full text
Get full text
Get full text
Article -
18
Internet of wearable things-based on lora and wi-fi healthcare monitoring system for medical applications
Published 2024“…The thesis presents the design and development of an Internet of Wearable Things-based on Lora and Wi-Fi Healthcare Monitoring System (IoWT-LWHMS) for medical applications, which includes the development of an IoWT-based healthcare system utilizing wearable sensing units for remotely and conveniently monitoring patients' health conditions such as Blood Pressure (BP), Heart Rate (HR), and Body Temperature (BT) in real-time and development of a LoRa and Wi-Fi networks for IoWT-LWHMS to support short-and long-range connectivity using the FiPy microcontroller with an integrated algorithm for data acquisition and update to the IoT platform. …”
Get full text
Get full text
Thesis -
19
A secured data transform-and-transfer algorithm for energy internet-of-things applications
Published 2023Article -
20
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…In this paper, an ant colony optimization (ACO) based WSN routing algorithm for IoT has been proposed and analyzed to enhance scalability, to accommodate node mobility and to minimize initialization delay for time critical applications in the context of IoT to find the optimal path of data transmission, improvising efficient IoT communications. …”
Get full text
Get full text
Get full text
Get full text
Article
