Search Results - (( web application sensor algorithm ) OR ( _ application security algorithm ))*
Search alternatives:
- application sensor »
- sensor algorithm »
- web application »
-
1
-
2
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. Furthermore, this project uses CT-UNO (Arduino Uno) microcontroller as its base together with the LM-35 Body Temperature sensor and the Pulse Sensor for reading heart rate, and a web system to manage the data collected. …”
Get full text
Get full text
Book Section -
3
Analysis on the Effect of Sensor Views in Image Reconstruction Produced by Optical Tomography System Using Charge-Coupled Device
Published 2024journal::journal article -
4
-
5
-
6
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Article -
7
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
8
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
9
Internet of things (IoT) based grid tension monitoring system
Published 2022“…The project method relies on the transfer of data from the sensor module to the microcontroller, where it is recorded and displayed on a website and mobile application that users may access to monitor sensor readings. …”
Get full text
Get full text
Undergraduates Project Papers -
10
-
11
Partitioning detection and connectivity restoration algorithm for WSAN
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.]
Published 2025“…Data transmission was orchestrated via a Python script, sensor_app.py’ which communicated the data to a dedicated web interface. …”
Get full text
Get full text
Get full text
Article -
13
Improving the security of LBlock lightweight algorithm using bit permutation
Published 2013Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The existing sequential and the proposed parallel algorithms were simulated successfully while preserving security properties. …”
Get full text
Get full text
Thesis -
15
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
16
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In comparison to the standard bioinspired algorithms and existing secure routing protocols, the proposed system reduces average energy consumption by nearly 50% regardless of the increase in the number of nodes and end-to-end delay of 40%, while finding the secure and optimal path in unison is designed to ensure trust in the IoT environment.…”
Get full text
Get full text
Get full text
Get full text
Article -
17
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003Get full text
Get full text
Article -
19
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
