Search Results - (( using function method algorithm ) OR ( iot implementation using algorithm ))
Search alternatives:
- implementation using »
- iot implementation »
- method algorithm »
- function method »
- using algorithm »
- using function »
-
1
Internet of things (IoT) based grid tension monitoring system
Published 2022“…The Internet of things method use in this monitoring system is by using ThingSpeak web and Blynk application. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
3
Face reidentification system to track factory visitors using OpenVINO
Published 2020“…Fortunately, developer may abstract away this difficulty by implement OpenVINO onto IoT devices and make it use CPU to inference on real time. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Terahertz sensing analysis for early detection of ganoderma boninense disease using near infrared (NIR) spectrometer
Published 2023“…The non-destructive method using NIRS with ML and predictive analytics has the potential to be a highly sensitive and reliable method for the early detection of G. boninense. …”
Get full text
Get full text
Thesis -
5
Monitoring water quality in Pusu river using Internet of Things (IoT) and Machine Learning (ML)
Published 2024“…In this dissertation, we propose the use of an IoT device to monitor the performance of a water treatment system and collect data on key water quality indicators. …”
Get full text
Get full text
Get full text
Article -
6
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
7
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The major objective for this project is to re-implement the proposed Energy Topology DRAND (E-T-DRAND) algorithm in IoT WSN using time slot allocation method and allocate nodes together with the node energy information and compare the obtained results with the corresponding results in the base paper. …”
Get full text
Get full text
Thesis -
9
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
10
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…This paper represents a model that accounts for the detection of botnets through the use of machine learning algorithms. The model examined anomalies, commonly referred to as botnets, in a cluster of IoT devices attempting to connect to a network. …”
Get full text
Get full text
Article -
11
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…IoT is considered a widely recognized implementation that includes intelligent health care, intelligent transport, and intelligent grids. …”
Get full text
Get full text
Article -
12
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…This was achieved through data transfer using Amazon Web Service (AWS-IoT) cloud connection. …”
Get full text
Get full text
Thesis -
13
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…The Internet of Things (IoT) is an expanding paradigm of object connectivity using a range of resource types and architectures to deliver ubiquitous and requested services. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Home intruder detection system using machine learning and IoT
Published 2022“…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
Get full text
Get full text
Get full text
Article -
15
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…In this work, we focus our review on activity recognition implementation strategies by examining various sensors and sensing technologies used to collect useful data from IoT devices, reviewing preprocessing and feature extraction techniques, as well as classification algorithms used to recognize human activities in smart homes. …”
Get full text
Get full text
Article -
16
-
17
IOT BASED CAR PARKING MANAGEMENT SYSTEM USING CAR PLATE RECOGNITION
Published 2019“…Hence, an IoT based car parking management system using car plate recognition is proposed. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications
Published 2025“…By using a task scheduling and offloading method, the FOCS algorithm arranges data according to size and sends it to the appropriate fog nodes. …”
Get full text
Get full text
Get full text
Thesis -
19
Development and integration of capacitive sensing and electrocuting grid for mosquitoes surveillance and control
Published 2020“…Smart Kit can be installed on conventional traps to convert them into smart traps with Internet of Things (IoT) functionality. The Base Station relays surveillance, control and maintenance data between the smart traps and the Central Server using cellular internet access and Long Range (LoRa) radio. …”
Get full text
Get full text
Get full text
Thesis -
20
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…The objective of this project is to design a synthesizable SHA-3 with 256-bits hash output and 1600-bits state array with lower area compared to Intel Microelectronic SHA-3. This research implements the SHA-3 in ways such that all the step mapping algorithms are logically combined to only use the input lanes of the state array to eliminate the intermediate logics and reduces the area size. …”
Get full text
Get full text
Thesis
