Search Results - (( iot applications a algorithm ) OR ( _ application server algorithm ))*
Search alternatives:
- application server »
- iot applications »
- server algorithm »
- applications a »
- a algorithm »
-
1
Home intruder detection system using machine learning and IoT
Published 2022“…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
Get full text
Get full text
Get full text
Article -
2
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). …”
Get full text
Get full text
Article -
3
-
4
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…At the time of writing this thesis, AAḃ algorithm still exists as a mathematical concept and proven in a mathematical based software. …”
Get full text
Get full text
Thesis -
5
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…The current security model in IoT networks uses centralized key exchange servers that present a security weak point. …”
Get full text
Get full text
Article -
6
Deep reinforcement learning online offloading for SWIPT multiple access edge computing network
Published 2021“…Simultaneous wireless information and power transfer (SWIPT) with mobile-edge computing (MEC) can improve the data processing capability of energy constrained networks. In this paper, a SWIPT-based MEC system is proposed, comprising a multi-antenna access point (AP), multiple single antenna low power IoT devices and a MEC server. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
7
Implementing server-side federated learning in an edge-cloud framework for precision aquaculture
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The vulnerabilities in BLE 4.2 and 5.x add an attractive perspective to the security of IoT technology. The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
Get full text
Get full text
Thesis -
9
Process Migration-Based Computational Offloading Framework for IoT-Supported Mobile Edge/Cloud Computing
Published 2020“…The proposed framework does not require application binaries at edge servers and thus seamlessly migrates native applications. …”
Get full text
Get full text
Article -
10
Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT)
Published 2021“…As the chosen model to be implemented in this analysis, the Q-learning algorithm proposal offers a possible solution for addressing evolving IoT environments and configurations. …”
Get full text
Get full text
Conference or Workshop Item -
11
Process migration-based computational offloading framework for IOT-supported mobile edge/cloud computing
Published 2019“…The proposed framework does not require application binaries at edge servers and thus seamlessly migrates native applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Applications of IoT and Artificial Intelligence in Water Quality Monitoring and Prediction: A Review
Published 2023Conference Paper -
13
Design and Fabrication of Smart Home With Internet of Things Enabled Automation System
Published 2019“…Home automation systems have attracted considerable attention with the advancement of communications technology. A smart home (SH) is an Internet of Things (IoT) application that utilizes the Internet to monitor and control appliances using a home automation system. …”
Get full text
Get full text
Get full text
Article -
14
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
15
Design and Implementation of an IoT-Enabled Smart Plug Socket for Home Energy Management
Published 2023Conference Paper -
16
Internet of wearable things-based on lora and wi-fi healthcare monitoring system for medical applications
Published 2024“…The thesis presents the design and development of an Internet of Wearable Things-based on Lora and Wi-Fi Healthcare Monitoring System (IoWT-LWHMS) for medical applications, which includes the development of an IoWT-based healthcare system utilizing wearable sensing units for remotely and conveniently monitoring patients' health conditions such as Blood Pressure (BP), Heart Rate (HR), and Body Temperature (BT) in real-time and development of a LoRa and Wi-Fi networks for IoWT-LWHMS to support short-and long-range connectivity using the FiPy microcontroller with an integrated algorithm for data acquisition and update to the IoT platform. …”
Get full text
Get full text
Thesis -
17
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
18
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
19
Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system
Published 2022“…The AllThingsTalkMaker IoT server is integrated into the TTN to be accessed using Web/mobile application interfaces. …”
Get full text
Get full text
Get full text
Article -
20
Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas
Published 2023“…We developed a new algorithm to measure and monitor flood levels and rate changes effectively. …”
Get full text
Get full text
Get full text
Article
