Search Results - (( iot applications ((new algorithm) OR (_ algorithm)) ) OR ( its application system algorithm ))
Search alternatives:
- iot applications »
- system algorithm »
- its application »
- new algorithm »
-
1
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
2
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
Get full text
Get full text
Get full text
Article -
3
-
4
'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Algorithms, Edited By Norliza Katuk, Roberto Vergallo, Tito Sugiharto, Copyright 2024".
Published 2024“…It offers readers a detailed understanding of how computer science intersects with Industry 5.0, how to humanise it, and its application to industry. This book has been written for technology professionals and practitioners, especially ones in healthcare, smart systems, and the oil and gas sectors. …”
Get full text
Get full text
Get full text
Book Chapter -
5
Smart agriculture: precision farming through sensor-based crop monitoring and control system
Published 2024“…Upon its integration into the comprehensive system for monitoring new data and predicting fruit growth, the model achieves an impressive 98% accuracy score. …”
Get full text
Get full text
Get full text
Article -
6
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al...
Published 2024“…It offers readers a detailed understanding of how computer science intersects with Industry 5.0, how to humanise it, and its application to industry. This book has been written for technology professionals and practitioners, especially ones in healthcare, smart systems, and the oil and gas sectors. …”
Get full text
Get full text
Get full text
Book Chapter -
7
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
8
-
9
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…This paper will help readers and researchers understand the IoT and its applicability to the real world.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions
Published 2022“…Thus, the respective underlying Fault Tolerance (FT) structure is a critical requirement that needs to be considered when designing any algorithm in WSNs. Moreover, with the exponential evolution of IoT systems, substantial enhancements of current FT mechanisms will ensure that the system constantly provides high network reliability and integrity. …”
Get full text
Get full text
Article -
11
Reliable low power network protocol in IoT for agriculture field
Published 2024“…Thus, IoT systems from other industrial sectors cannot be used since they do not have the same constraints or requirements. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A comparison of the proposed system with other competing solutions demonstrates its superiority. …”
Get full text
Get full text
Article -
13
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A comparison of the proposed system with other competing solutions demonstrates its superiority. …”
Get full text
Get full text
Article -
14
IOT-based fertigation system / Mohamad Amir Furqan Darus
Published 2024“…This abstract outlines an IoT-based fertigation system, focusing on key components like the ESP32 (ESPDuino-32), MDD3A Cytron motor driver, EC sensor, and water pump, and emphasizes its advantages.The IoT system incorporates various sensors, including those for soil moisture, temperature, humidity, nutrients, and Ph. …”
Get full text
Get full text
Student Project -
15
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). …”
Get full text
Get full text
Article -
16
-
17
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. Furthermore, this project uses CT-UNO (Arduino Uno) microcontroller as its base together with the LM-35 Body Temperature sensor and the Pulse Sensor for reading heart rate, and a web system to manage the data collected. …”
Get full text
Get full text
Book Section -
18
Home intruder detection system using machine learning and IoT
Published 2022“…Home Intruder Detection System (HIDES) is an Internet of Things (IoT) system with a mobile application to help homeowners in house surveillance by alerting users for any potential threats remotely. …”
Get full text
Get full text
Get full text
Article -
19
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…In this project, the UGV combines two main elements, which are collision avoidance system (CAS), path planning system (PPS) and implementation of (IoT) for data analysing in developing an IoT equipped UGV for surveillance purpose. …”
Get full text
Get full text
Monograph -
20
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis
