Search Results - (( developing iot implementation algorithm ) OR ( java location based algorithm ))

Refine Results
  1. 1

    Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain by Muhammad, Norhidayah, Mohamad Zain, Jasni

    Published 2019
    “…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. CP-ABE algorithm is one-to-many technique suitable for secure grouping communication, but this algorithm is not a lightweight feature. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications by Rafique, Majid

    Published 2025
    “…Even though 5G technology has significantly improved connectivity and data transmission rates, the increasing number of IoT devices creates processing challenges. This study focuses on a Fog Optimized Computing System (FOCS) algorithm, which is developed to handle network congestion and processing challenges imposed by the increasing number of IoT devices. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Smart IoT energy optimisation and localisation monitoring for e-bike sharing by Mohamed, Mawada Ahmed, Toha, Siti Fauziah, Rahman, Md Ataur, Khairudin, Moh.

    Published 2025
    “…The methodology involved integrating sensors to collect key data, implementing connectivity for real-time monitoring, and developing an energy optimization algorithm to prolong battery life, improving the efficiency of the e-bike sharing system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    ON CAMPUS IOT DEMONSTRATION FOR STUDENT HOTSPOT TRACKING USING WIRELESS SENSORS NETWORK AND INTEGRATED SOFTWARE PLATEFORM by SUKRI, FIRMAN SYAH

    Published 2017
    “…Internet of Things(IoT) has become a new trend for technology development. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  12. 12

    Performance Analysis In IoT Based Home Automation Using Hybrid RS-LDPC Codes by Ng, Lay Wei

    Published 2018
    “…The error detection and correction algorithms implemented in home automation system is successfully developed by encoding and decoding the text messages that transmitted from webpage to Raspberry Pi board using Python and HTML programming language. …”
    Get full text
    Get full text
    Monograph
  13. 13

    A study on obstacle detection for IoT based automated guided vehicle (AGV) by Loh, Jit Hao, M. Nafis, O. Z.

    Published 2022
    “…Current concern on obstacle detection in AGVs has become more subjective due to the uprising issue on the congested environment in the workplace. Therefore, an IoT system is developed to allow a flexible wireless communication among mobile robots in an indoor industrial environment. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT) by Jamal, A.A., Bakar, M.T.A.

    Published 2021
    “…As the chosen model to be implemented in this analysis, the Q-learning algorithm proposal offers a possible solution for addressing evolving IoT environments and configurations. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering by Umelo, Nnamdi Henry, Noordin, Nor Kamariah, A. Rasid, Mohd Fadlee, Tan, Kim Geok, Hashim, Fazirulhisyam

    Published 2023
    “…In the identification stage, the tags are read only in frame chunks that match their group IDs while a new frame size look up table is developed to boost efficiency. Variants of the proposed kg-DFSA, traditional DFSA and another grouping based DFSA algorithm (FCM-DFSA) were implemented in MATLAB. …”
    Get full text
    Get full text
    Article
  19. 19

    A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose by Azizan, Anis Natasha

    Published 2019
    “…In this project, the UGV combines two main elements, which are collision avoidance system (CAS), path planning system (PPS) and implementation of (IoT) for data analysing in developing an IoT equipped UGV for surveillance purpose. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications by IZZAH NILAMSYUKRIYAH, BUANG, Kartinah, Zen, Syahrul Nizam, Junaini

    Published 2025
    “…These approaches have demonstrated improvements in packet delivery ratios (PDRs), latency reduction, and energy efficiency within mobile IoT contexts. Despite notable advancements, significant opportunities remain for enhancing scalability, developing hybrid solutions, applying these methodologies in real-world contexts, and implementing robust security protocols. …”
    Get full text
    Get full text
    Get full text
    Article