Search Results - (( iot applications ((based algorithm) OR (_ algorithm)) ) OR ( its application using algorithm ))*
Search alternatives:
- iot applications »
- its application »
- using algorithm »
-
1
-
2
IOT-based fertigation system / Mohamad Amir Furqan Darus
Published 2024“…The Fertigation, the precise application of water and fertilizers in agriculture, has evolved with the integration of Internet of Things (IoT) technology. …”
Get full text
Get full text
Student Project -
3
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
4
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…The sharing of confidential personal data such as medical data continues to take place regularly across the globe; it is therefore crucial to protect data from unauthorized access by adversaries. One of the algorithms that is commonly used due to its exemplary security and use in extensive applications is the advanced encryption standard (AES) algorithm. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
Get full text
Get full text
Book Section -
7
Real-time time series error-based data reduction for internet-of-things applications
Published 2018“…This work is inspired by Perceptually Important Points (PIP) data reduction algorithm due to its superior data reduction ability. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
10
-
11
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…Internet provides almost unlimited connection nowadays and it is widely used in our daily life such as in industrial, IoT and consumer applications. …”
Get full text
Get full text
Thesis -
12
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…This may be useful for real-world applications such as surveillance systems based on IoT and customer behaviour analytics systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…This paper will help readers and researchers understand the IoT and its applicability to the real world.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
15
Fog-cloud scheduling simulator for reinforcement learning algorithms
Published 2023“…Fog computing is a popular choice for Internet of Things (IoT) applications, such as electricity, health, transportation, smart cities, security, and more. …”
Get full text
Get full text
Article -
16
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. …”
Get full text
Get full text
Article -
17
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…Here, the novelty of the work is the application of MVO algorithm in fine-turning the hyperparameters involved in BiGRU model. …”
Get full text
Get full text
Get full text
Article -
18
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
19
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
20
Reliable low power network protocol in IoT for agriculture field
Published 2024“…The network layer protocol simplifies the routing process based on connection tables from BNT. The data link layer protocol handles the Medium Access Control (MAC) of the mesh network efficiently using algorithms based on the Scheduling sub-cycle of the Fast, Adaptive, and Energy-efficient Multi-channel-multi-path (FAEM) protocol by Liew et al. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
