Search Results - (( iot applications usage algorithm ) OR ( its application a algorithm ))
Search alternatives:
- applications usage »
- iot applications »
- usage algorithm »
- its application »
- application a »
- a algorithm »
-
1
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
Get full text
Get full text
Get full text
Article -
2
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
Get full text
Get full text
Book Section -
3
Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap
Published 2014“…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
Get full text
Get full text
Article -
4
Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap
Published 2014“…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
Get full text
Get full text
Thesis -
5
Internet of things security vulnerabilities and recommended solutions
Published 2018“…This paper focusses on the security issues posed by large-scale heterogeneous IoT paradigm and arriving at a secure architectural framework adoptable by a variety of applications that include smart transportation, smart cities, smart healthcare, etc. based on IoT.…”
Get full text
Get full text
Get full text
Article -
6
Design and implementation of solar-powered with IoT-Enabled portable irrigation system
Published 2022“…This paper proposes a solar-powered portable water pump (SPWP) for IoT-enabled smart irrigation system (IoT-SIS). …”
Get full text
Get full text
Get full text
Article -
7
Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system
Published 2022“…Long-range wide-area network (LoRaWAN) has emerged as a key technology for Internet of Things (IoT) applications worldwide owing to its cost-effectiveness, robustness to interference, low power, licensed-free frequency band, and long-range connectivity, thanks to the adaptive data rate. …”
Get full text
Get full text
Get full text
Article -
8
-
9
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
10
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
11
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The vulnerabilities in BLE 4.2 and 5.x add an attractive perspective to the security of IoT technology. The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
Get full text
Get full text
Thesis -
12
-
13
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Intersection Features For Android Botnet Classification
Published 2019“…Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
Get full text
Get full text
Get full text
Article -
15
Design and Fabrication of Smart Home With Internet of Things Enabled Automation System
Published 2019“…A smart home (SH) is an Internet of Things (IoT) application that utilizes the Internet to monitor and control appliances using a home automation system. …”
Get full text
Get full text
Get full text
Article -
16
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…The possibility for an object to communicate with others and to collect information about the environment enables a broad range of application markets. One of the main challenges in the IOT system is in the security and privacy of the generated data. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Scheduling strategy of a cloud-based virtual energy storage system (VESS) for achieving energy saving
Published 2024“…The research explores a review of the literature on limitation of ESS, concepts of VESS, role of cloud computing and IoT in VESS as well as the control strategy algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Design and Implementation of an IoT-Enabled Smart Plug Socket for Home Energy Management
Published 2023Conference Paper -
19
Design of monitoring and control system of electricity power limiter using internet of things
Published 2025“…Users can access information related to electricity usage via web-based or mobile applications that provide data display in the form of a reports. …”
Get full text
Get full text
Book Section -
20
Rabin-p encryption scheme analysis on MQTT
Published 2023Get full text
Get full text
Conference or Workshop Item
