Search Results - (( its application tools algorithm ) OR ( iot application service algorithm ))*

Refine Results
  1. 1

    'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 T... by Mohamad Nazim, Jambli, Mohamad Zul Haziq, Mohd Fadzli, Sinarwati, Mohamad Suhaili, Nur Haryani, Zakaria

    Published 2024
    “…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  2. 2

    'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al... by Eka Wahyu, Aditya, Nur Haryani, Zakaria, Fazli, Azzali, Mohamad Nazim, Jambli

    Published 2024
    “…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  3. 3
  4. 4
  5. 5

    Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System by Nwogbaga, Nweso Emmanuel

    Published 2023
    “…The application of the Internet of Things (IoT) is increasing to almost all aspects of human endevour. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…Furthermore, an offline authentication phase uses the OTP algorithm to authenticate registered users even if the connectivity services are unavailable. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Lightweight ontology architecture for QoS aware service discovery and semantic CoAP data management in heterogeneous IoT environment by Sukhavasi, Suman, Perumal, Thinagaran, Mustapha, Norwati, Yaakob, Razali

    Published 2026
    “…The results confirm the effectiveness of the proposed lightweight ontology architecture for service discovery and data management in heterogeneous IoT environments.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Faulty sensor detection mechanism using multi-variate sensors in IoT by Al-Atrakchii, Khaldoon Ammar

    Published 2019
    “…IoT devices are equipped with sensors such as temperature, humidity, pulse sensor, smoke and etc., offer many types of services for these applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20