Search Results - (( iot application ((new algorithm) OR (tree algorithm)) ) OR ( its application system algorithm ))
Search alternatives:
- system algorithm »
- iot application »
- its application »
- tree algorithm »
- new algorithm »
-
1
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
2
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
Get full text
Get full text
Get full text
Article -
3
Smart agriculture: precision farming through sensor-based crop monitoring and control system
Published 2024“…Upon its integration into the comprehensive system for monitoring new data and predicting fruit growth, the model achieves an impressive 98% accuracy score. …”
Get full text
Get full text
Get full text
Article -
4
Intersection Features For Android Botnet Classification
Published 2019“…Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
Get full text
Get full text
Get full text
Article -
5
-
6
'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 T...
Published 2024“…It offers readers a detailed understanding of how computer science intersects with Industry 5.0, how to humanise it, and its application to industry. This book has been written for technology professionals and practitioners, especially ones in healthcare, smart systems, and the oil and gas sectors. …”
Get full text
Get full text
Get full text
Book Chapter -
7
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…This paper will help readers and researchers understand the IoT and its applicability to the real world.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
9
Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions
Published 2022“…Thus, the respective underlying Fault Tolerance (FT) structure is a critical requirement that needs to be considered when designing any algorithm in WSNs. Moreover, with the exponential evolution of IoT systems, substantial enhancements of current FT mechanisms will ensure that the system constantly provides high network reliability and integrity. …”
Get full text
Get full text
Article -
10
Reliable low power network protocol in IoT for agriculture field
Published 2024“…Thus, IoT systems from other industrial sectors cannot be used since they do not have the same constraints or requirements. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al...
Published 2024“…It offers readers a detailed understanding of how computer science intersects with Industry 5.0, how to humanise it, and its application to industry. This book has been written for technology professionals and practitioners, especially ones in healthcare, smart systems, and the oil and gas sectors. …”
Get full text
Get full text
Get full text
Book Chapter -
13
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). …”
Get full text
Get full text
Article -
14
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A comparison of the proposed system with other competing solutions demonstrates its superiority. …”
Get full text
Get full text
Article -
16
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A comparison of the proposed system with other competing solutions demonstrates its superiority. …”
Get full text
Get full text
Article -
17
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…In this project, the UGV combines two main elements, which are collision avoidance system (CAS), path planning system (PPS) and implementation of (IoT) for data analysing in developing an IoT equipped UGV for surveillance purpose. …”
Get full text
Get full text
Monograph -
18
Smart attendance system with Iot based face recognition using deep learning approach
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
20
