Search Results - (( its application _ algorithm ) OR ( iot applications a algorithm ))*
Search alternatives:
- iot applications »
- its application »
- applications a »
- a algorithm »
-
1
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
2
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
3
-
4
-
5
-
6
IOT-based fertigation system / Mohamad Amir Furqan Darus
Published 2024“…The Fertigation, the precise application of water and fertilizers in agriculture, has evolved with the integration of Internet of Things (IoT) technology. …”
Get full text
Get full text
Student Project -
7
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
Get full text
Get full text
Get full text
Article -
8
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…The sharing of confidential personal data such as medical data continues to take place regularly across the globe; it is therefore crucial to protect data from unauthorized access by adversaries. One of the algorithms that is commonly used due to its exemplary security and use in extensive applications is the advanced encryption standard (AES) algorithm. …”
Get full text
Get full text
Get full text
Article -
9
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
Get full text
Get full text
Thesis -
10
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. Furthermore, this project uses CT-UNO (Arduino Uno) microcontroller as its base together with the LM-35 Body Temperature sensor and the Pulse Sensor for reading heart rate, and a web system to manage the data collected. …”
Get full text
Get full text
Book Section -
11
-
12
'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 T...
Published 2024“…It offers readers a detailed understanding of how computer science intersects with Industry 5.0, how to humanise it, and its application to industry. …”
Get full text
Get full text
Get full text
Book Chapter -
13
-
14
Real-time time series error-based data reduction for internet-of-things applications
Published 2018“…This work is inspired by Perceptually Important Points (PIP) data reduction algorithm due to its superior data reduction ability. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Home intruder detection system using machine learning and IoT
Published 2022“…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
Get full text
Get full text
Get full text
Article -
16
Hyperledger Fabric Framework with 5G Network for Blockchain-based Security of IoT Smart Home Applications
Published 2021Get full text
Get full text
Conference or Workshop Item -
17
-
18
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…This paper will help readers and researchers understand the IoT and its applicability to the real world.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
20
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al...
Published 2024“…It offers readers a detailed understanding of how computer science intersects with Industry 5.0, how to humanise it, and its application to industry. …”
Get full text
Get full text
Get full text
Book Chapter
