Search Results - (( _ applications ((usage algorithm) OR (tree algorithm)) ) OR ( iot application based algorithm ))
Search alternatives:
- application based »
- usage algorithm »
- iot application »
- tree algorithm »
-
1
Intersection Features For Android Botnet Classification
Published 2019“…Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
Get full text
Get full text
Get full text
Article -
2
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
3
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
4
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
5
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The vulnerabilities in BLE 4.2 and 5.x add an attractive perspective to the security of IoT technology. The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
Get full text
Get full text
Thesis -
6
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…The project result shows that the usage of smart devices combine with a data optimization algorithm produces accurate outputs that can later be employed to lessen the work that are carried out by the medical officer.…”
Get full text
Get full text
Book Section -
8
Reinforcement Learning Algorithm for Optimising Durian Irrigation Systems: Maximising Growth and Water Efficiency
Published 2024“…This study presents a Reinforcement Learning-based algorithm designed to optimise irrigation for Durio Zibethinus (i.e., durian) trees, aiming to maximise tree growth and reduce water usage. …”
Get full text
Get full text
Get full text
Article -
9
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
Get full text
Get full text
Thesis -
11
Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap
Published 2014“…This paper is mainly interested in near real-time wireless application with regards to Internet of Things (IoT). …”
Get full text
Get full text
Article -
12
Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap
Published 2014“…This paper is mainly interested in near real-time wireless application with regards to Internet of Things (IoT). …”
Get full text
Get full text
Thesis -
13
Internet of things security vulnerabilities and recommended solutions
Published 2018“…The applications based on IoT are ubiquitous in providing passive user involvement on the collective approach of sensor technology, embedded system, networking and communication convergence with analytical computing. …”
Get full text
Get full text
Get full text
Article -
14
Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah
Published 2021“…Following the application of a new methodology on the real site, the result indicated the consistency of DTM values of all the algorithms at different flying heights but there were relatively small differences between all the algorithms used. …”
Get full text
Get full text
Thesis -
15
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
16
Scheduling strategy of a cloud-based virtual energy storage system (VESS) for achieving energy saving
Published 2024“…The research explores a review of the literature on limitation of ESS, concepts of VESS, role of cloud computing and IoT in VESS as well as the control strategy algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Design and implementation of solar-powered with IoT-Enabled portable irrigation system
Published 2022“…This paper proposes a solar-powered portable water pump (SPWP) for IoT-enabled smart irrigation system (IoT-SIS). A NodeMCU microcontroller with a Wi-Fi interface and soil moisture, temperature, and humidity sensors are exploited to monitor and control the water pump and build an IoT-based irrigation system. …”
Get full text
Get full text
Get full text
Article -
18
Design and Fabrication of Smart Home With Internet of Things Enabled Automation System
Published 2019“…A smart home (SH) is an Internet of Things (IoT) application that utilizes the Internet to monitor and control appliances using a home automation system. …”
Get full text
Get full text
Get full text
Article -
19
Prediction of Machine Failure by Using Machine Learning Algorithm
Published 2019Get full text
Get full text
Final Year Project -
20
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…The possibility for an object to communicate with others and to collect information about the environment enables a broad range of application markets. One of the main challenges in the IOT system is in the security and privacy of the generated data. …”
Get full text
Get full text
Get full text
Get full text
Article
