Search Results - (( iot application server algorithm ) OR ( _ application using algorithms ))*

Refine Results
  1. 1

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. …”
    Get full text
    Get full text
    Article
  4. 4

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks by Al Ahmed, Mahmoud Tayseer, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Abdullah, Azizol

    Published 2023
    “…The current security model in IoT networks uses centralized key exchange servers that present a security weak point. …”
    Get full text
    Get full text
    Article
  6. 6

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…The vulnerabilities in BLE 4.2 and 5.x add an attractive perspective to the security of IoT technology. The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Deep reinforcement learning online offloading for SWIPT multiple access edge computing network by Teckchai, Tiong, Ismail Saad, Tze, Kenneth Kin Teo, Herwansyah Lago

    Published 2021
    “…More computation-intensive and low latency applications are emerging recently, and they are constrained by the computing power and battery life of internet of things (IoT). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  8. 8
  9. 9

    Process Migration-Based Computational Offloading Framework for IoT-Supported Mobile Edge/Cloud Computing by Yousafzai, Abdullah, Yaqoob, Ibrar, Imran, Muhammad, Gani, Abdullah, Noor, Rafidah Md

    Published 2020
    “…The proposed framework does not require application binaries at edge servers and thus seamlessly migrates native applications. …”
    Get full text
    Get full text
    Article
  10. 10

    Process migration-based computational offloading framework for IOT-supported mobile edge/cloud computing by Abdullah Yousafzai, Ibrar Yaqoob, Muhammad Imran, Abdullah Gani, Rafidah Md Noor

    Published 2019
    “…The proposed framework does not require application binaries at edge servers and thus seamlessly migrates native applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT) by Jamal, A.A., Bakar, M.T.A.

    Published 2021
    “…Q-learning is one of the successful techniques available for the exploration of IoT nodes, but context based problems have already been established and simplified as issues of dedicated server management, IoT object data acquisition issues, and unique application requirements. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Bundle Sorting Mobile Application by Zulkifley, Muhammad Dzofir Hafiz

    Published 2020
    “…The camera will be connected with the mobile devices that installed the fabric sorting application to capture all the information and quantity of garments by using the Bluetooth or server. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14

    Design and Fabrication of Smart Home With Internet of Things Enabled Automation System by Jabbar, Waheb A., Tee, Kok Kian, Roshahliza, M. Ramli, Siti Nabila, Zubir, Nurthaqifah, S. M. Zamrizaman, Balfaqih, Mohammed, Shepelev, Vladimir, Alharbi, Soltan

    Published 2019
    “…A smart home (SH) is an Internet of Things (IoT) application that utilizes the Internet to monitor and control appliances using a home automation system. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Internet of wearable things-based on lora and wi-fi healthcare monitoring system for medical applications by Suliman Abdulmalek, Hamood Ahmed

    Published 2024
    “…The thesis presents the design and development of an Internet of Wearable Things-based on Lora and Wi-Fi Healthcare Monitoring System (IoWT-LWHMS) for medical applications, which includes the development of an IoWT-based healthcare system utilizing wearable sensing units for remotely and conveniently monitoring patients' health conditions such as Blood Pressure (BP), Heart Rate (HR), and Body Temperature (BT) in real-time and development of a LoRa and Wi-Fi networks for IoWT-LWHMS to support short-and long-range connectivity using the FiPy microcontroller with an integrated algorithm for data acquisition and update to the IoT platform. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system by Jabbar, Waheb A., Annathurai, Sanmathy, Tajul Ariffin, A. Rahim, M. Fitri, Mohd Fauzi

    Published 2022
    “…The AllThingsTalkMaker IoT server is integrated into the TTN to be accessed using Web/mobile application interfaces. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  19. 19

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  20. 20

    Design of monitoring and control system of electricity power limiter using internet of things by Gunoto, Pamor, Yuliansyah, Toni, Nurdin, M., Hisyamuddin, .

    Published 2025
    “…This system uses the PZM-004T sensor to measure electricity consumption by measuring current and voltage and then sending the data via the WiFi network to a cloud server. …”
    Get full text
    Get full text
    Book Section