Search Results - (( web application _ algorithm ) OR ( iot application using (algorithmic OR algorithms) ))*
Search alternatives:
- web application »
- iot application »
-
1
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
2
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…This was achieved through data transfer using Amazon Web Service (AWS-IoT) cloud connection. …”
Get full text
Get full text
Thesis -
3
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. Furthermore, this project uses CT-UNO (Arduino Uno) microcontroller as its base together with the LM-35 Body Temperature sensor and the Pulse Sensor for reading heart rate, and a web system to manage the data collected. …”
Get full text
Get full text
Book Section -
4
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
5
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
6
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
7
-
8
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
9
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
11
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…The proposed routing algorithm is simulated using MATLAB for performance evaluations. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Development of an aeration system for smart aquaculture farming
Published 2022“…The system could connect to the Blynk IoT cloud platform to both transmit data from the sensors to be displayed on the web interface or mobile application and receive instructions from the user wirelessly. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Internet of things (IoT) based grid tension monitoring system
Published 2022“…The Internet of things method use in this monitoring system is by using ThingSpeak web and Blynk application. Using the publish and monitor implementation, data is transmitted over the internet protocol. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
15
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
16
-
17
-
18
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
19
-
20
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…The evaluation of the performance of these attack graph models using IoT networks or devices as case studies is also emphasized. …”
Review
