Search Results - (( iot application using algorithm ) OR ( its application during algorithm ))*
Search alternatives:
- application during »
- during algorithm »
- iot application »
- using algorithm »
- its application »
-
1
-
2
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
3
-
4
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. …”
Get full text
Get full text
Thesis -
5
Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning
Published 2026Get full text
Get full text
Get full text
Proceeding Paper -
6
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
7
-
8
A case study of unmanned aerial vehicle (drone) technology and its applications in the COVID-19 pandemic
Published 2022“…On the other hand, a soft computing approach such as artificial intelligence (A.I.), the internet of things (IoT), neural network, fuzzy logic, genetic algorithm, and machine learning has become crucial in the design and application of UAVs. …”
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
Modeling arbiter-PUF in NodeMCU ESP8266 using artificial neural network
Published 2022“…PUF technology has a huge potential to be used for device identification and authentication in resource-constrained internet of things (IoT) applications such as wireless sensor networks (WSN). …”
Get full text
Get full text
Get full text
Article -
12
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
13
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
14
Portable Stress Detection System for Autistic Children Using Fuzzy Logic
Published 2024journal::journal article -
15
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…The proposed routing algorithm is simulated using MATLAB for performance evaluations. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
17
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
-
19
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
20
