Search Results - (( iot applications using algorithm ) OR ( its relation based algorithm ))*
Search alternatives:
- applications using »
- iot applications »
- using algorithm »
- relation based »
- its relation »
-
1
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…This may be useful for real-world applications such as surveillance systems based on IoT and customer behaviour analytics systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
IoT based IMU sensor network for human arm pose estimation / Jahangir Hassan Khan
Published 2019“…The objective of this project is to design and build an IoT based sensor system that can send its data wirelessly to a computer, which can then analyse the data and estimate the position of the human arm at remote location. …”
Get full text
Get full text
Get full text
Thesis -
3
Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system
Published 2022“…The AllThingsTalkMaker IoT server is integrated into the TTN to be accessed using Web/mobile application interfaces. …”
Get full text
Get full text
Get full text
Article -
4
Enhancing data integrity in internet of things-based healthcare applications: A visualization approach for duplicate detection
Published 2025“…A Python-based visualization framework using Pandas and Matplotlib was developed to detect and represent duplicate records. …”
Get full text
Get full text
Get full text
Article -
5
Factoring the modulus of type n = p2q by finding small solutions of the equation er − (ns + t) = αp2 + βq2
Published 2021“…The modulus of type N=p2q is often used in many variants of factoring-based cryptosystems due to its ability to fasten the decryption process. …”
Get full text
Get full text
Get full text
Article -
6
Enhancing data integrity in internet of things-based healthcare applications: a visualization approach for duplicate detection
Published 2025“…A Python-based visualization framework using Pandas and Matplotlib was developed to detect and represent duplicate records. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
9
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
10
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…The proposed routing algorithm is simulated using MATLAB for performance evaluations. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
12
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
15
-
16
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
17
-
18
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
19
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
20
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…The evaluation of the performance of these attack graph models using IoT networks or devices as case studies is also emphasized. …”
Review
