Search Results - (( iot application using algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- iot application »
- using algorithm »
-
1
-
2
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
3
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
4
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…The proposed routing algorithm is simulated using MATLAB for performance evaluations. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
6
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
9
-
10
-
11
-
12
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
13
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024“…This algorithm is proposed to be applied to a reporting service application in an IoT environment. …”
Proceedings Paper -
14
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…The evaluation of the performance of these attack graph models using IoT networks or devices as case studies is also emphasized. …”
Review -
15
A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry
Published 2021“…The proposed scheme uses the AES-ECC algorithm to provide secure communication and efficient key management. …”
Get full text
Get full text
Article -
16
IOT-based fertigation system / Mohamad Amir Furqan Darus
Published 2024“…The Fertigation, the precise application of water and fertilizers in agriculture, has evolved with the integration of Internet of Things (IoT) technology. …”
Get full text
Get full text
Student Project -
17
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The algorithm use time division multiplexing algorithm together with hello message to allocate the neighbors and their energy level to find the best way to communicate and reduce packet drop, less signal interference and increase throughput. …”
Get full text
Get full text
Thesis -
18
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
20
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…The blockchain structure requires a consensus algorithm that is lightweight, efficient and meets the computational limitations of the IoT devices. …”
Get full text
Get full text
Thesis
