Search Results - (( java application using algorithm ) OR ( iot implementation 5s algorithm ))
Search alternatives:
- iot implementation »
- implementation 5s »
- java application »
- using algorithm »
- 5s algorithm »
-
1
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
3
-
4
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The major objective for this project is to re-implement the proposed Energy Topology DRAND (E-T-DRAND) algorithm in IoT WSN using time slot allocation method and allocate nodes together with the node energy information and compare the obtained results with the corresponding results in the base paper. …”
Get full text
Get full text
Thesis -
5
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
6
Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications
Published 2025“…This study focuses on a Fog Optimized Computing System (FOCS) algorithm, which is developed to handle network congestion and processing challenges imposed by the increasing number of IoT devices. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
9
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…The blockchain structure requires a consensus algorithm that is lightweight, efficient and meets the computational limitations of the IoT devices. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
-
13
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The vulnerabilities in BLE 4.2 and 5.x add an attractive perspective to the security of IoT technology. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
18
-
19
-
20
An Improved Indoor Positioning Algorithm Based on RSSI-Trilateration Technique for Internet of Things (IOT)
Published 2023Conference Paper
