Search Results - (( iot applications ((a algorithm) OR (_ algorithm)) ) OR ( web application based algorithm ))
Search alternatives:
- application based »
- iot applications »
- web application »
- a algorithm »
-
1
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
2
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. Furthermore, this project uses CT-UNO (Arduino Uno) microcontroller as its base together with the LM-35 Body Temperature sensor and the Pulse Sensor for reading heart rate, and a web system to manage the data collected. …”
Get full text
Get full text
Book Section -
3
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
4
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
5
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
6
Internet of things (IoT) based grid tension monitoring system
Published 2022Get full text
Get full text
Undergraduates Project Papers -
7
-
8
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…Secondly, a hybrid Genetic Algorithm and Enhanced Inertia Weight Particle Swarm Optimization (GAEIWPSO) algorithm for optimal resource allocation to minimize the delay is proposed. …”
Get full text
Get full text
Thesis -
9
Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas
Published 2023“…We developed a new algorithm to measure and monitor flood levels and rate changes effectively. …”
Get full text
Get full text
Get full text
Article -
10
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
11
Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system
Published 2022“…The AllThingsTalkMaker IoT server is integrated into the TTN to be accessed using Web/mobile application interfaces. …”
Get full text
Get full text
Get full text
Article -
12
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…Routing algorithms must ensure the data transmission in an efficient way, having proper knowledge of the IoT system. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas
Published 2023“…We developed a new algorithm to measure and monitor flood levels and rate changes effectively. …”
Get full text
Get full text
Get full text
Article -
17
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
18
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
19
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023“…Soft computing; Internet of Things (IOT); QR tag; Security Architecture; Security factors; Security objectives; Smart access; Smart city applications; Verification algorithms; Internet of things…”
Conference Paper -
20
Design of monitoring and control system of electricity power limiter using internet of things
Published 2025“…This system uses the PZM-004T sensor to measure electricity consumption by measuring current and voltage and then sending the data via the WiFi network to a cloud server. Users can access information related to electricity usage via web-based or mobile applications that provide data display in the form of a reports. …”
Get full text
Get full text
Book Section
