Search Results - (( iot applications ((a algorithm) OR (bat algorithm)) ) OR ( its application testing algorithm ))*
Search alternatives:
- application testing »
- testing algorithm »
- iot applications »
- its application »
- bat algorithm »
- a algorithm »
-
1
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
2
-
3
Hyperledger Fabric Framework with 5G Network for Blockchain-based Security of IoT Smart Home Applications
Published 2021Get full text
Get full text
Conference or Workshop Item -
4
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…Blockchain, with its decentralized model of authentication, can provide a solution for decentralized authentication in IoT networks. …”
Get full text
Get full text
Article -
5
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al...
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter -
6
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…This paper will help readers and researchers understand the IoT and its applicability to the real world.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning
Published 2026Get full text
Get full text
Get full text
Proceeding Paper -
8
Reliable low power network protocol in IoT for agriculture field
Published 2024“…The new network protocol will be tested in a simulation and benchmarked against other similar energy-efficient protocols to determine its capability.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Fog-cloud scheduling simulator for reinforcement learning algorithms
Published 2023“…Fog computing is a popular choice for Internet of Things (IoT) applications, such as electricity, health, transportation, smart cities, security, and more. …”
Get full text
Get full text
Article -
10
Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap
Published 2014“…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
Get full text
Get full text
Article -
11
Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap
Published 2014“…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
Get full text
Get full text
Thesis -
12
Design and implementation of solar-powered with IoT-Enabled portable irrigation system
Published 2022“…The system functionality has been practically tested in a real environment, and its performance has been evaluated.…”
Get full text
Get full text
Get full text
Article -
13
-
14
Semantic interoperability test method for data schema comparison with constrained application protocol
Published 2019“…We introduced a test scenario between the devices based on Constrained Application Protocol (CoAP). …”
Get full text
Get full text
Conference or Workshop Item -
15
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…The scheme was tested for its security analysis using the formal security verification under the widely accepted AVISPA tool. …”
Get full text
Get full text
Article -
16
Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system
Published 2022“…Long-range wide-area network (LoRaWAN) has emerged as a key technology for Internet of Things (IoT) applications worldwide owing to its cost-effectiveness, robustness to interference, low power, licensed-free frequency band, and long-range connectivity, thanks to the adaptive data rate. …”
Get full text
Get full text
Get full text
Article -
17
Smart attendance system with Iot based face recognition using deep learning approach
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…The application of the Internet of Things (IoT) is increasing to almost all aspects of human endevour. …”
Get full text
Get full text
Thesis -
20
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article
