Search Results - (( iot application ((new algorithm) OR (_ algorithm)) ) OR ( its application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- iot application »
- its application »
- new algorithm »
-
1
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
2
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al...
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter -
3
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. …”
Get full text
Get full text
Article -
4
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…This paper will help readers and researchers understand the IoT and its applicability to the real world.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
Reliable low power network protocol in IoT for agriculture field
Published 2024“…The new network protocol will be tested in a simulation and benchmarked against other similar energy-efficient protocols to determine its capability.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…The scheme was tested for its security analysis using the formal security verification under the widely accepted AVISPA tool. …”
Get full text
Get full text
Article -
7
Hyperledger Fabric Framework with 5G Network for Blockchain-based Security of IoT Smart Home Applications
Published 2021Get full text
Get full text
Conference or Workshop Item -
8
A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry
Published 2021“…The proposed scheme uses the AES-ECC algorithm to provide secure communication and efficient key management. …”
Get full text
Get full text
Article -
9
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…But in dense IoT applications, much more than two tags can constitute a collision slot. …”
Get full text
Get full text
Article -
10
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The base-work paper of the research presents an improvement of DRAND algorithm based on energy consumption in IoT WSN to enhance the node energy consumption and iv increase the network lifetime. …”
Get full text
Get full text
Thesis -
11
Smart attendance system with Iot based face recognition using deep learning approach
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
Get full text
Get full text
Get full text
Article -
13
An efficient real-time data collection model for multivariate sensors in internet of things (IOT) applications
Published 2019“…In the applications of the Internet of Things (IoT), sensor board depends on a battery that has a limited lifetime to function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
The Evolutionary Convergent Algorithm: A Guiding Path of Neural Network Advancement
Published 2025“…In this study, a new idea centered on seed growth, Seed Growth Algorithm (SGA), as a conditional convergent evolutionary algorithm is proposed for optimizing several discrete and continuous optimization problems. …”
Article -
18
Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap
Published 2014“…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
Get full text
Get full text
Article -
19
Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap
Published 2014“…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
Get full text
Get full text
Thesis -
20
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item
