Search Results - (( _ application new algorithm ) OR ( iot applications ((usage algorithm) OR (rsa algorithm)) ))*
Search alternatives:
- iot applications »
- application new »
- new algorithm »
- rsa algorithm »
-
1
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…This paper compares between various LW crypto functions in terms of their power consumption, design, complexity and memory usage. In addition, the paper highlights the need for a new one-way hash function which supports variable transformation and variable block length size to suit several applications.…”
Get full text
Get full text
Get full text
Get full text
Article -
2
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
Get full text
Get full text
Get full text
Article -
3
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
4
Intersection Features For Android Botnet Classification
Published 2019“…Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
Get full text
Get full text
Get full text
Article -
5
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
6
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
7
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The vulnerabilities in BLE 4.2 and 5.x add an attractive perspective to the security of IoT technology. The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
Get full text
Get full text
Thesis -
8
-
9
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap
Published 2014“…This paper is mainly interested in near real-time wireless application with regards to Internet of Things (IoT). …”
Get full text
Get full text
Article -
11
Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap
Published 2014“…This paper is mainly interested in near real-time wireless application with regards to Internet of Things (IoT). …”
Get full text
Get full text
Thesis -
12
Internet of things security vulnerabilities and recommended solutions
Published 2018“…The application framework of IoT comprises of devices that are highly heterogeneous and compute migrations from sensor to IoT gateways to edge/fog computing to the cloud and then back to the client along with various alarming components. …”
Get full text
Get full text
Get full text
Article -
13
Design and implementation of solar-powered with IoT-Enabled portable irrigation system
Published 2022“…Furthermore, the integration of the IoT concept has facilitated real-time monitoring and control of the pump; thus, enhancing the water usage efficiency and enabling convenient farming operations. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Design and Fabrication of Smart Home With Internet of Things Enabled Automation System
Published 2019“…A smart home (SH) is an Internet of Things (IoT) application that utilizes the Internet to monitor and control appliances using a home automation system. …”
Get full text
Get full text
Get full text
Article -
16
Scheduling strategy of a cloud-based virtual energy storage system (VESS) for achieving energy saving
Published 2024“…The research explores a review of the literature on limitation of ESS, concepts of VESS, role of cloud computing and IoT in VESS as well as the control strategy algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Design and Implementation of an IoT-Enabled Smart Plug Socket for Home Energy Management
Published 2023Conference Paper -
18
Design of monitoring and control system of electricity power limiter using internet of things
Published 2025“…Users can access information related to electricity usage via web-based or mobile applications that provide data display in the form of a reports. …”
Get full text
Get full text
Book Section -
19
Rabin-p encryption scheme analysis on MQTT
Published 2023Get full text
Get full text
Conference or Workshop Item -
20
Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system
Published 2022“…The AllThingsTalkMaker IoT server is integrated into the TTN to be accessed using Web/mobile application interfaces. …”
Get full text
Get full text
Get full text
Article
