Search Results - (( web application model algorithm ) OR ( iot application server algorithm ))*
Search alternatives:
- application server »
- application model »
- server algorithm »
- web application »
- model algorithm »
- iot application »
-
1
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
2
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
3
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). …”
Get full text
Get full text
Article -
4
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. …”
Get full text
Get full text
Article -
5
-
6
Implementing server-side federated learning in an edge-cloud framework for precision aquaculture
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Home intruder detection system using machine learning and IoT
Published 2022“…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
Get full text
Get full text
Get full text
Article -
8
Deep reinforcement learning online offloading for SWIPT multiple access edge computing network
Published 2021“…In this paper, a SWIPT-based MEC system is proposed, comprising a multi-antenna access point (AP), multiple single antenna low power IoT devices and a MEC server. The IoT devices exploit the harvested energy for either locally computing or offloading the tasks to the MEC server. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
9
Process Migration-Based Computational Offloading Framework for IoT-Supported Mobile Edge/Cloud Computing
Published 2020“…The proposed framework does not require application binaries at edge servers and thus seamlessly migrates native applications. …”
Get full text
Get full text
Article -
10
Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT)
Published 2021“…Q-learning is one of the successful techniques available for the exploration of IoT nodes, but context based problems have already been established and simplified as issues of dedicated server management, IoT object data acquisition issues, and unique application requirements. …”
Get full text
Get full text
Conference or Workshop Item -
11
Process migration-based computational offloading framework for IOT-supported mobile edge/cloud computing
Published 2019“…The proposed framework does not require application binaries at edge servers and thus seamlessly migrates native applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The vulnerabilities in BLE 4.2 and 5.x add an attractive perspective to the security of IoT technology. The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
Get full text
Get full text
Thesis -
13
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…This investigation takes the form of an IoT environment, beginning with an in-depth examination of the AAḃ encryption scheme design, and continuing into the development and real-world application of AAḃ from its mathematical origin. …”
Get full text
Get full text
Thesis -
14
-
15
Design and Fabrication of Smart Home With Internet of Things Enabled Automation System
Published 2019“…A smart home (SH) is an Internet of Things (IoT) application that utilizes the Internet to monitor and control appliances using a home automation system. …”
Get full text
Get full text
Get full text
Article -
16
Web application vulnerabilities detection model
Published 2016“…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
17
Design and Implementation of an IoT-Enabled Smart Plug Socket for Home Energy Management
Published 2023Conference Paper -
18
Car dealership web application
Published 2022“…The web service performed model explaining and monitoring by querying the application data from the Azure SQL Database. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Applications of IoT and Artificial Intelligence in Water Quality Monitoring and Prediction: A Review
Published 2023Conference Paper -
20
Internet of wearable things-based on lora and wi-fi healthcare monitoring system for medical applications
Published 2024“…Specifically, the Internet of Wearable Things (IoWT) enables wearable devices to exchange data with cloud-based IoT servers. Continuous monitoring of vital parameters is crucial for managing chronic diseases effectively. …”
Get full text
Get full text
Thesis
