Search Results - (( its application during algorithm ) OR ( things application using algorithm ))*

Refine Results
  1. 1
  2. 2

    A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate by Abdulraheem, Waleed Khalid Amin

    Published 2019
    “…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A case study of unmanned aerial vehicle (drone) technology and its applications in the COVID-19 pandemic by Aabid, Abdul, Perveez, Bisma, Perveen, Nagma, Khan, Sher Afghan, Shabbir, Omar

    Published 2022
    “…On the other hand, a soft computing approach such as artificial intelligence (A.I.), the internet of things (IoT), neural network, fuzzy logic, genetic algorithm, and machine learning has become crucial in the design and application of UAVs. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Embedded Dual Band Rfid Based Blood Glucose Monitoring System For Internet Of Medical Things by Hamid, Shabinar Abdul

    Published 2020
    “…These two parameters are then taken into account in experimental setup for performance evaluation of the enhanced CSMA/CA (EN-CSMA/CA) algorithm that uses an external interrupt mechanism and a cross layer approach. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Modeling arbiter-PUF in NodeMCU ESP8266 using artificial neural network by Mispan, Mohd Syafiq, Jidin, Aiman Zakwan, Mohd Nasir, Haslinah, Brahin, Noor Mohd Ariff, Mohd Nawi, Illani

    Published 2022
    “…PUF technology has a huge potential to be used for device identification and authentication in resource-constrained internet of things (IoT) applications such as wireless sensor networks (WSN). …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering by Umelo, Nnamdi Henry, Noordin, Nor Kamariah, A. Rasid, Mohd Fadlee, Tan, Kim Geok, Hashim, Fazirulhisyam

    Published 2023
    “…In the initialization stage, the reader uses improved K-means clustering running concurrently with a tag counter algorithm to cluster tags into K groups using tags RN16 while the counter returns an accurate tag number estimate. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20