Search Results - (( its application new algorithm ) OR ( iot applications ((bat algorithm) OR (_ algorithm)) ))

Refine Results
  1. 1
  2. 2

    Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway by Nurul Saliha A. Ibrahim, Nurul Saliha A. Ibrahim, Faiz A. Saparudin, Faiz A. Saparudin

    Published 2023
    “…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Algorithms, Edited By Norliza Katuk, Roberto Vergallo, Tito Sugiharto, Copyright 2024". by Mohamad Nazim, Jambli, Mohamad Zul Haziq, Mohd Fadzli, Sinarwati, Mohamad Suhaili, Nur Haryani, Zakaria

    Published 2024
    “…Practical insights are offered alongside cutting-edge applications, such as blockchain, the Internet of Things (IoT), QR code, and augmented reality (AR), as well as the consideration of privacy, trust, and authentication through digital signatures. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  7. 7

    A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate by Abdulraheem, Waleed Khalid Amin

    Published 2019
    “…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks by Al Ahmed, Mahmoud Tayseer, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Abdullah, Azizol

    Published 2023
    “…These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. …”
    Get full text
    Get full text
    Article
  11. 11

    Smart agriculture: precision farming through sensor-based crop monitoring and control system by Mohamad Hakhrani, Asyful Azhim, Abdul Hamid, Syamsul Bahrin

    Published 2024
    “…Upon its integration into the comprehensive system for monitoring new data and predicting fruit growth, the model achieves an impressive 98% accuracy score. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al... by Eka Wahyu, Aditya, Nur Haryani, Zakaria, Fazli, Azzali, Mohamad Nazim, Jambli

    Published 2024
    “…Practical insights are offered alongside cutting-edge applications, such as blockchain, the Internet of Things (IoT), QR code, and augmented reality (AR), as well as the consideration of privacy, trust, and authentication through digital signatures. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  14. 14

    Reliable low power network protocol in IoT for agriculture field by Wong, Christopher Jin Soon

    Published 2024
    “…The new network protocol will be tested in a simulation and benchmarked against other similar energy-efficient protocols to determine its capability.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15
  16. 16

    Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions by Adday, Ghaihab Hassan, K. Subramaniam, Shamala, Ahmad Zukarnain, Zuriati, Samian, Normalia

    Published 2022
    “…WSNs are a good demonstration of an ambient intelligence vision, in which the environment becomes intelligent and aware of its surroundings. WSN has unique features which create its own distinct network attributes and is deployed widely for critical real-time applications that require stringent prerequisites when dealing with faults to ensure the avoidance and tolerance management of catastrophic outcomes. …”
    Get full text
    Get full text
    Article
  17. 17

    SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). …”
    Get full text
    Get full text
    Article
  18. 18

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article
  19. 19

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article
  20. 20

    A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose by Azizan, Anis Natasha

    Published 2019
    “…These implementations possibly makes the UGV more authentic and widen its application in mission-based operation or even in simple commercial operation.…”
    Get full text
    Get full text
    Monograph