Search Results - (( web application tools algorithm ) OR ( iot application server algorithm ))*

Refine Results
  1. 1

    SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). …”
    Get full text
    Get full text
    Article
  2. 2

    Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks by Al Ahmed, Mahmoud Tayseer, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Abdullah, Azizol

    Published 2023
    “…Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Deep reinforcement learning online offloading for SWIPT multiple access edge computing network by Teckchai, Tiong, Ismail Saad, Tze, Kenneth Kin Teo, Herwansyah Lago

    Published 2021
    “…In this paper, a SWIPT-based MEC system is proposed, comprising a multi-antenna access point (AP), multiple single antenna low power IoT devices and a MEC server. The IoT devices exploit the harvested energy for either locally computing or offloading the tasks to the MEC server. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  7. 7

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Process Migration-Based Computational Offloading Framework for IoT-Supported Mobile Edge/Cloud Computing by Yousafzai, Abdullah, Yaqoob, Ibrar, Imran, Muhammad, Gani, Abdullah, Noor, Rafidah Md

    Published 2020
    “…The proposed framework does not require application binaries at edge servers and thus seamlessly migrates native applications. …”
    Get full text
    Get full text
    Article
  9. 9

    Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan by Aznan, Muhammad Nur Syazwanie Aznan

    Published 2019
    “…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT) by Jamal, A.A., Bakar, M.T.A.

    Published 2021
    “…Q-learning is one of the successful techniques available for the exploration of IoT nodes, but context based problems have already been established and simplified as issues of dedicated server management, IoT object data acquisition issues, and unique application requirements. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Process migration-based computational offloading framework for IOT-supported mobile edge/cloud computing by Abdullah Yousafzai, Ibrar Yaqoob, Muhammad Imran, Abdullah Gani, Rafidah Md Noor

    Published 2019
    “…The proposed framework does not require application binaries at edge servers and thus seamlessly migrates native applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…The vulnerabilities in BLE 4.2 and 5.x add an attractive perspective to the security of IoT technology. The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…This investigation takes the form of an IoT environment, beginning with an in-depth examination of the AAḃ encryption scheme design, and continuing into the development and real-world application of AAḃ from its mathematical origin. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Design and Fabrication of Smart Home With Internet of Things Enabled Automation System by Jabbar, Waheb A., Tee, Kok Kian, Roshahliza, M. Ramli, Siti Nabila, Zubir, Nurthaqifah, S. M. Zamrizaman, Balfaqih, Mohammed, Shepelev, Vladimir, Alharbi, Soltan

    Published 2019
    “…A smart home (SH) is an Internet of Things (IoT) application that utilizes the Internet to monitor and control appliances using a home automation system. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Internet of wearable things-based on lora and wi-fi healthcare monitoring system for medical applications by Suliman Abdulmalek, Hamood Ahmed

    Published 2024
    “…Specifically, the Internet of Wearable Things (IoWT) enables wearable devices to exchange data with cloud-based IoT servers. Continuous monitoring of vital parameters is crucial for managing chronic diseases effectively. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas by Muhammad Aizzat, Zakaria, Jabbar, Waheb A., Noorazliza, Sulaiman

    Published 2023
    “…The system's design allows for future expansion, enabling simultaneous data reporting from multiple sensor monitoring units to a server via a central gateway as a network.…”
    Get full text
    Get full text
    Get full text
    Article