Search Results - (( _ applications ((usage algorithm) OR (rsa algorithm)) ) OR ( iot application system algorithm ))
Search alternatives:
- system algorithm »
- iot application »
- rsa algorithm »
-
1
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
2
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…The conventional cryptography methods, such for Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA) and Rivest–Shamir–Adleman, (RSA), work well on systems which have reasonable processing power and memory capabilities. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
4
RSA algorithm performance in short messaging system exchange environment
Published 2011“…This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
6
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…The project result shows that the usage of smart devices combine with a data optimization algorithm produces accurate outputs that can later be employed to lessen the work that are carried out by the medical officer.…”
Get full text
Get full text
Book Section -
9
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
10
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Scheduling strategy of a cloud-based virtual energy storage system (VESS) for achieving energy saving
Published 2024“…As the cost of energy storage system (ESS) remained high, the application of VESS emerges as a financially viable alternative to manage the energy consumption of flexible loads like air conditioner to reduce the energy usage. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Design and implementation of solar-powered with IoT-Enabled portable irrigation system
Published 2022“…The proposed irrigation system updates the gathered information from sensors (moisture, temperature, and humidity) using an integrated algorithm to the Blynk IoT cloud in real-time. …”
Get full text
Get full text
Get full text
Article -
13
Internet of things security vulnerabilities and recommended solutions
Published 2018“…The applications based on IoT are ubiquitous in providing passive user involvement on the collective approach of sensor technology, embedded system, networking and communication convergence with analytical computing. …”
Get full text
Get full text
Get full text
Article -
14
Design and Fabrication of Smart Home With Internet of Things Enabled Automation System
Published 2019“…A smart home (SH) is an Internet of Things (IoT) application that utilizes the Internet to monitor and control appliances using a home automation system. …”
Get full text
Get full text
Get full text
Article -
15
Design of monitoring and control system of electricity power limiter using internet of things
Published 2025“…This system is equipped with a notification feature in the application to provide warnings if excessive electricity consumption occurs, as well as the ability to control devices remotely to optimize electricity usage. …”
Get full text
Get full text
Book Section -
16
Design and Implementation of an IoT-Enabled Smart Plug Socket for Home Energy Management
Published 2023Conference Paper -
17
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system
Published 2022“…The AllThingsTalkMaker IoT server is integrated into the TTN to be accessed using Web/mobile application interfaces. …”
Get full text
Get full text
Get full text
Article -
20
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project
