Search Results - (( based application path algorithm ) OR ( iot application using (algorithmic OR algorithms) ))*
Search alternatives:
- based application »
- application path »
- iot application »
- path algorithm »
-
1
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
2
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. In this paper, an ant colony optimization (ACO) based WSN routing algorithm for IoT has been proposed and analyzed to enhance scalability, to accommodate node mobility and to minimize initialization delay for time critical applications in the context of IoT to find the optimal path of data transmission, improvising efficient IoT communications. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN
Published 2022“…EECPP consist of two algorithms which is Stop Point Prediction Algorithm using K-Means, which finding the stop point for the AG after grouping the IDs into clusters, and Path Planning Algorithm using Particle Swarm Optimization which connect all of the stop point in shortest route. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…Due to the high diversity of research areas, targeted issues, and adopted algorithms and techniques, finding the right research path in task offloading is highly demanding. …”
Get full text
Get full text
Article -
6
Improving Network Consistency and Data Availability Using Fuzzy C Mean Clustering Algorithm in Wireless Sensor Networks
Published 2024thesis::doctoral thesis -
7
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…An Unmanned Ground Vehicle (UGV) is a ground vehicle that operates remotely, without having human on-board. UGVs are widely used for mission-based applications that are often hazardous or inconvenient for humankind. …”
Get full text
Get full text
Monograph -
8
Reliable low power network protocol in IoT for agriculture field
Published 2024“…The network layer protocol simplifies the routing process based on connection tables from BNT. The data link layer protocol handles the Medium Access Control (MAC) of the mesh network efficiently using algorithms based on the Scheduling sub-cycle of the Fast, Adaptive, and Energy-efficient Multi-channel-multi-path (FAEM) protocol by Liew et al. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
-
10
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
11
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
12
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
13
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
14
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
15
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
16
-
17
-
18
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
19
-
20
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…The evaluation of the performance of these attack graph models using IoT networks or devices as case studies is also emphasized. …”
Review
