Search Results - (( iot applications usage algorithm ) OR ( _ application ((a algorithm) OR (based algorithm)) ))

Refine Results
  1. 1

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An efficient IoT-based smart water meter system of smart city environment by Al-Madhrahi, R., Abdullah, J., Alduais, N. A. M., Mahdin, H.B., Saad, A. -M. H. Y., Nasser, A. B., Alduais, H. S.

    Published 2021
    “…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway by Nurul Saliha A. Ibrahim, Nurul Saliha A. Ibrahim, Faiz A. Saparudin, Faiz A. Saparudin

    Published 2023
    “…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.] by Kushan, Albin Lemuel, Anuar, Muhammad Hazwan, Mohd Supir, Mohd Hafifi, Ahmad Fadzil, Ahmad Firdaus, Zolkeplay, Anwar Farhan

    Published 2021
    “…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
    Get full text
    Get full text
    Book Section
  5. 5
  6. 6

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. There are four experiment conducted such as processing time, power usage, memory usage and data modification attack. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Intersection Features For Android Botnet Classification by Ismail, Najiahtul Syafiqah, Yusof, Robiah, Saad, Halizah, Abdollah, Mohd Faizal, Yusof, Robiah

    Published 2019
    “…Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Scheduling strategy of a cloud-based virtual energy storage system (VESS) for achieving energy saving by Lau, Sim Yee

    Published 2024
    “…As the cost of energy storage system (ESS) remained high, the application of VESS emerges as a financially viable alternative to manage the energy consumption of flexible loads like air conditioner to reduce the energy usage. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Internet of things security vulnerabilities and recommended solutions by Olanrewaju, Rashidah Funke, Khan, Burhan ul Islam, Anwar, Farhat, Mir, Roohie Naaz

    Published 2018
    “…This paper focusses on the security issues posed by large-scale heterogeneous IoT paradigm and arriving at a secure architectural framework adoptable by a variety of applications that include smart transportation, smart cities, smart healthcare, etc. based on IoT.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap by Masirap, Madzirin

    Published 2014
    “…This paper is mainly interested in near real-time wireless application with regards to Internet of Things (IoT). …”
    Get full text
    Get full text
    Article
  11. 11

    Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap by Masirap, Madzirin

    Published 2014
    “…This paper is mainly interested in near real-time wireless application with regards to Internet of Things (IoT). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Design and implementation of solar-powered with IoT-Enabled portable irrigation system by Roshahliza, M. Ramli, Jabbar, Waheb A.

    Published 2022
    “…A NodeMCU microcontroller with a Wi-Fi interface and soil moisture, temperature, and humidity sensors are exploited to monitor and control the water pump and build an IoT-based irrigation system. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Design and Fabrication of Smart Home With Internet of Things Enabled Automation System by Jabbar, Waheb A., Tee, Kok Kian, Roshahliza, M. Ramli, Siti Nabila, Zubir, Nurthaqifah, S. M. Zamrizaman, Balfaqih, Mohammed, Shepelev, Vladimir, Alharbi, Soltan

    Published 2019
    “…A prototype called IoT@HoMe is developed with an algorithm to enable the monitoring of home conditions and automate the control of home appliances over the Internet anytime and anywhere. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Design of monitoring and control system of electricity power limiter using internet of things by Gunoto, Pamor, Yuliansyah, Toni, Nurdin, M., Hisyamuddin, .

    Published 2025
    “…This system uses the PZM-004T sensor to measure electricity consumption by measuring current and voltage and then sending the data via the WiFi network to a cloud server. Users can access information related to electricity usage via web-based or mobile applications that provide data display in the form of a reports. …”
    Get full text
    Get full text
    Book Section
  15. 15

    Performance evaluation of lightweight Crypto functions for Internet of things applications by Jaleel, Nubila, Habaebi, Mohamed Hadi, Islam, Md Rafiqul

    Published 2020
    “…The possibility for an object to communicate with others and to collect information about the environment enables a broad range of application markets. One of the main challenges in the IOT system is in the security and privacy of the generated data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system by Jabbar, Waheb A., Annathurai, Sanmathy, Tajul Ariffin, A. Rahim, M. Fitri, Mohd Fauzi

    Published 2022
    “…The AllThingsTalkMaker IoT server is integrated into the TTN to be accessed using Web/mobile application interfaces. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20