Search Results - (( based application system algorithm ) OR ( iot applications new algorithm ))
Search alternatives:
- based application »
- system algorithm »
- iot applications »
- applications new »
- new algorithm »
-
1
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
Get full text
Get full text
Get full text
Article -
2
A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry
Published 2021“…Compared to the previous works, the scheme requires less computation due to the lightweight cryptographic algorithms utilized. Finally, the results showed that the proposed system provides seamless, secure, and efficient authentication operation for the automotive industry, specifically car-sharing systems, making the proposed system suitable for applications in limited and intermittent network connections.…”
Get full text
Get full text
Article -
3
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…But in dense IoT applications, much more than two tags can constitute a collision slot. …”
Get full text
Get full text
Article -
4
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The base-work paper of the research presents an improvement of DRAND algorithm based on energy consumption in IoT WSN to enhance the node energy consumption and iv increase the network lifetime. …”
Get full text
Get full text
Thesis -
5
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Smart agriculture: precision farming through sensor-based crop monitoring and control system
Published 2024“…Upon its integration into the comprehensive system for monitoring new data and predicting fruit growth, the model achieves an impressive 98% accuracy score. …”
Get full text
Get full text
Get full text
Article -
8
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
9
Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN
Published 2022“…Unmanned aerial vehicles (UAV) have enormous potential in enabling new applications in various areas, ranging from communication, military, security, to traffic-monitoring applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…This paper will help readers and researchers understand the IoT and its applicability to the real world.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
IoT Soil Moisture Monitoring and Irrigation System Development
Published 2020“…At the same time, with a self-sufficient and self-organized irrigation system based on the water-control algorithm. The developed system covered the three layers in IoT architecture: perception layer, network layer and application layer. …”
Get full text
Get full text
Get full text
Proceeding -
12
Reliable low power network protocol in IoT for agriculture field
Published 2024“…An Internet of Things (IoT) sensor network consists of sensor nodes which sample and send data to the base station. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions
Published 2022“…Thus, the respective underlying Fault Tolerance (FT) structure is a critical requirement that needs to be considered when designing any algorithm in WSNs. Moreover, with the exponential evolution of IoT systems, substantial enhancements of current FT mechanisms will ensure that the system constantly provides high network reliability and integrity. …”
Get full text
Get full text
Article -
14
-
15
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…The possibility for an object to communicate with others and to collect information about the environment enables a broad range of application markets. One of the main challenges in the IOT system is in the security and privacy of the generated data. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas
Published 2023“…We developed a new algorithm to measure and monitor flood levels and rate changes effectively. …”
Get full text
Get full text
Get full text
Article -
18
Smart attendance system with Iot based face recognition using deep learning approach
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
