Search Results - (( _ application out algorithm ) OR ( iot applications using algorithm ))*
Search alternatives:
- applications using »
- iot applications »
- application out »
- using algorithm »
- out algorithm »
-
1
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
2
-
3
A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…The project result shows that the usage of smart devices combine with a data optimization algorithm produces accurate outputs that can later be employed to lessen the work that are carried out by the medical officer.…”
Get full text
Get full text
Book Section -
5
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…In conclusion, the SHA-3 with smaller area and higher performance has been designed and is possible to cater the needs of IoT application.…”
Get full text
Get full text
Thesis -
6
-
7
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
8
Chromametric Techniques for IoT, real-time and reliable Food Freshness Measurement
Published 2015“…The mobile application itself is built by using Android studio platform and the level freshness of fish has been tested out to determine whether the fish is “FRESH, GOOD or SPOILED”…”
Get full text
Get full text
Final Year Project -
9
Unimas Vehicles On Road Monitoring And Recognition (Iot System)
Published 2023“…Vehicle monitoring activities are carried out by assessing the intensity of capture data from Canny Edge Detector Algorithm and IR sensors received for summons. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
10
-
11
Designing an integrated AIOT system for tracking class attendance
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…Our approach is, therefore, highly effective and efficient, with the potential to be used in real-world network security applications.…”
Get full text
Get full text
Article -
13
-
14
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
15
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…The proposed routing algorithm is simulated using MATLAB for performance evaluations. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
17
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
-
19
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
20
