Search Results - (( iot applications using algorithm ) OR ( _ applications usage algorithm ))
Search alternatives:
- applications using »
- applications usage »
- iot applications »
- using algorithm »
- usage algorithm »
- _ applications »
-
1
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
2
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
3
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
4
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The vulnerabilities in BLE 4.2 and 5.x add an attractive perspective to the security of IoT technology. The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
Get full text
Get full text
Thesis -
5
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…The project result shows that the usage of smart devices combine with a data optimization algorithm produces accurate outputs that can later be employed to lessen the work that are carried out by the medical officer.…”
Get full text
Get full text
Book Section -
6
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Intersection Features For Android Botnet Classification
Published 2019“…Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
Get full text
Get full text
Get full text
Article -
8
Design and implementation of solar-powered with IoT-Enabled portable irrigation system
Published 2022“…The proposed irrigation system updates the gathered information from sensors (moisture, temperature, and humidity) using an integrated algorithm to the Blynk IoT cloud in real-time. …”
Get full text
Get full text
Get full text
Article -
9
Rabin-p encryption scheme analysis on MQTT
Published 2023Get full text
Get full text
Conference or Workshop Item -
10
Design and Fabrication of Smart Home With Internet of Things Enabled Automation System
Published 2019“…A smart home (SH) is an Internet of Things (IoT) application that utilizes the Internet to monitor and control appliances using a home automation system. …”
Get full text
Get full text
Get full text
Article -
11
Design of monitoring and control system of electricity power limiter using internet of things
Published 2025“…Users can access information related to electricity usage via web-based or mobile applications that provide data display in the form of a reports. …”
Get full text
Get full text
Book Section -
12
-
13
Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system
Published 2022“…The AllThingsTalkMaker IoT server is integrated into the TTN to be accessed using Web/mobile application interfaces. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
16
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…The proposed routing algorithm is simulated using MATLAB for performance evaluations. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
18
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper
