Search Results - (( iot application designing algorithm ) OR ( its application tools algorithm ))
Search alternatives:
- application designing »
- designing algorithm »
- application tools »
- iot application »
- its application »
- tools algorithm »
-
1
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
2
-
3
A case study of unmanned aerial vehicle (drone) technology and its applications in the COVID-19 pandemic
Published 2022“…On the other hand, a soft computing approach such as artificial intelligence (A.I.), the internet of things (IoT), neural network, fuzzy logic, genetic algorithm, and machine learning has become crucial in the design and application of UAVs. …”
Get full text
Get full text
Get full text
Article -
4
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
5
-
6
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. …”
Get full text
Get full text
Get full text
Article -
8
Portable Stress Detection System for Autistic Children Using Fuzzy Logic
Published 2024journal::journal article -
9
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…In this paper, an ant colony optimization (ACO) based WSN routing algorithm for IoT has been proposed and analyzed to enhance scalability, to accommodate node mobility and to minimize initialization delay for time critical applications in the context of IoT to find the optimal path of data transmission, improvising efficient IoT communications. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
IoT Enabled Intra-Vehicular Communication for Designing A Smart Car
Published 2016“…A Test-Bed is designed in order to validate the proposed algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
Get full text
Get full text
Thesis -
14
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
15
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
16
-
17
An efficient real-time data collection model for multivariate sensors in internet of things (IOT) applications
Published 2019“…This work provides an extensive analysis for the design and performance evaluation of real-time data collection model for multivariate sensors in IoT applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…In conclusion, the SHA-3 with smaller area and higher performance has been designed and is possible to cater the needs of IoT application.…”
Get full text
Get full text
Thesis -
19
A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
