Search Results - (( its application using algorithm ) OR ( iot application during algorithm ))

Refine Results
  1. 1
  2. 2

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate by Abdulraheem, Waleed Khalid Amin

    Published 2019
    “…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    A case study of unmanned aerial vehicle (drone) technology and its applications in the COVID-19 pandemic by Aabid, Abdul, Perveez, Bisma, Perveen, Nagma, Khan, Sher Afghan, Shabbir, Omar

    Published 2022
    “…On the other hand, a soft computing approach such as artificial intelligence (A.I.), the internet of things (IoT), neural network, fuzzy logic, genetic algorithm, and machine learning has become crucial in the design and application of UAVs. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Modeling arbiter-PUF in NodeMCU ESP8266 using artificial neural network by Mispan, Mohd Syafiq, Jidin, Aiman Zakwan, Mohd Nasir, Haslinah, Brahin, Noor Mohd Ariff, Mohd Nawi, Illani

    Published 2022
    “…PUF technology has a huge potential to be used for device identification and authentication in resource-constrained internet of things (IoT) applications such as wireless sensor networks (WSN). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    Smart room system with dual authentication by Harun, Muhammad Hazmi, Abdul Rahid@Abdul Rashid, Nurul Najwa

    Published 2025
    “…It uses the Histogram of Oriented Gradients (HOG) algorithm for face recognition, which results in lower power consumption and faster processing. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Unimas Vehicles On Road Monitoring And Recognition (Iot System) by Nur Farah Hanis, Ahmad Masdil Fazli

    Published 2023
    “…Vehicle monitoring activities are carried out by assessing the intensity of capture data from Canny Edge Detector Algorithm and IR sensors received for summons. This method is appropriate for crowd sourcing applications that aim to reduce travel time, congestion, and pollution. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    Smart agriculture: precision farming through sensor-based crop monitoring and control system by Mohamad Hakhrani, Asyful Azhim, Abdul Hamid, Syamsul Bahrin

    Published 2024
    “…Collaborating with the Urban Farming Farm under the auspices of the Kulliyyah of Economics and Management Science, an IoT system comprising soil moisture, temperature, and humidity sensors, alongside an actuator, is devised to facilitate data acquisition and required intervention specifically for Okra Fruit during the pre-harvesting stage. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Human presence detection system by Tai, Xi Yang

    Published 2024
    “…Overall, the project contributes valuable insights into the development of IoT-based human presence detection systems, paving the way for applications in occupancy monitoring and resource optimization.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN by Ibrahim, Nurul Saliha Amani

    Published 2022
    “…Unmanned aerial vehicles (UAV) have enormous potential in enabling new applications in various areas, ranging from communication, military, security, to traffic-monitoring applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis