Search Results - (( iot applications ((bat algorithm) OR (based algorithm)) ) OR ( its application need algorithm ))

Refine Results
  1. 1
  2. 2

    IOT-based fertigation system / Mohamad Amir Furqan Darus by Darus, Mohamad Amir Furqan

    Published 2024
    “…The Fertigation, the precise application of water and fertilizers in agriculture, has evolved with the integration of Internet of Things (IoT) technology. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Real-time time series error-based data reduction for internet-of-things applications by Wong, Siaw Ling

    Published 2018
    “…Such offline mode is not suitable for IoT applications such as monitoring, surveillance and alert system which needs to detect events at real-time. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5

    Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks by Al Ahmed, Mahmoud Tayseer, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Abdullah, Azizol

    Published 2023
    “…These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. …”
    Get full text
    Get full text
    Article
  6. 6

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A review on internet of things (IoT) based water monitoring system by Malaika Shaikha, Azad Alia, Riaz Ahmed, Babar Ali Shaikh

    Published 2023
    “…The traditional method to monitor water quality and quantity has been a quite difficult task involving a large amount of labour and cash. But the IoT application slashes human involvement and most of the procedural decisions are made by algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Selective of IoT applications for water quality monitoring in Malaysia by Zainuddin, Ahmad Anwar, Amir Hussin, Amir 'Aatieff, Annas, Ammar Haziq, Bharudin, Mohamad Syafiq Asyraf, Abdul Rajat @ Abdul Razak, Alin Farhain, Mahazir, Muhammad Nur Badri, Ahmad Puzi, Asmarani, Handayani, Dini Oktarina Dwi, Abdul Raziff, Abdul Rafiez

    Published 2024
    “…Overall, this paper proposes a comprehensive overview of IoT-based applications for water quality monitoring in Malaysia’s aquaculture with the advancements in IoT technology and its potential impact on improving water quality management practices.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions by Adday, Ghaihab Hassan, K. Subramaniam, Shamala, Ahmad Zukarnain, Zuriati, Samian, Normalia

    Published 2022
    “…Thus, the respective underlying Fault Tolerance (FT) structure is a critical requirement that needs to be considered when designing any algorithm in WSNs. …”
    Get full text
    Get full text
    Article
  12. 12

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article
  13. 13

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article
  14. 14

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. In this paper, an ant colony optimization (ACO) based WSN routing algorithm for IoT has been proposed and analyzed to enhance scalability, to accommodate node mobility and to minimize initialization delay for time critical applications in the context of IoT to find the optimal path of data transmission, improvising efficient IoT communications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    An efficient IoT-based smart water meter system of smart city environment by Al-Madhrahi, R., Abdullah, J., Alduais, N. A. M., Mahdin, H.B., Saad, A. -M. H. Y., Nasser, A. B., Alduais, H. S.

    Published 2021
    “…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20