Search Results - (( developing security sensor algorithm ) OR ( java application system algorithm ))
Search alternatives:
- developing security »
- sensor algorithm »
- java application »
- system algorithm »
- security sensor »
-
1
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…In this paper, a secure bio-inspired WSN (Wireless Sensor Network) routing protocol based on ant colony optimization (ACO) algorithm for IoT has been proposed and analyzed to find secure and optimal path that is energy-efficient as well as aiming at providing trust in IoT environment. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
-
4
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…The trust evaluation system has been enhanced in the development of the proposed routing algorithm and the node trust value is evaluated, sensor node misbehavior is identified, and energy conservation is maximized. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
-
7
-
8
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Development of security in wireless sensor network using IPv6
Published 2009Get full text
Get full text
Thesis -
10
Revolutionizing Perimeter Intrusion Detection: A Machine Learning-Driven Approach with Curated Dataset Generation for Enhanced Security
Published 2023“…To solve the above problem, we designed a prototype for PIDS using a DHT22 temperature and humidity sensor, vibration sensor SW- 420 Module Pinout, Mini PIR motion sensor, and Arduino UNO. …”
Get full text
Get full text
Article -
11
Pyroelectric infrared sensor for intruder detection
Published 2004“…This paper discusses the application of pyroelectric infrared sensor (PIR) and the application of processing algorithm in handling sensor information so as to provide real time occupancy map on computer in control unit. …”
Get full text
Conference or Workshop Item -
12
Development of a robotic hand glove system for secure grasp with AI wireless sensor data
Published 2023“…Robotic Hand glove is one of the most commonly used technique in the rehabilitation systems. In this paper, we developed a robotic hand system with a proposed sensing mechanism-based AI algorithm, which can acquire grasping forces from human fingers. …”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Energy-efficient intrusion detection in wireless sensor network
Published 2012“…The use of Wireless Sensor Networks (WSNs) has developed rapidly in the last decade. …”
Get full text
Get full text
Conference or Workshop Item -
15
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities
Published 2021“…In addition, the security of the scheme was informally analysed to demonstrate that the scheme is secure from different attacks, e.g., sensor capture, replay, and other network and physical attacks. …”
Get full text
Get full text
Get full text
Article -
17
Minimising coverage holes for prediction-based mobile object target tracking in wireless sensor networks
Published 2017“…Hence, work presented in this thesis could be useful to WSN algorithms developers, and also to people who plan the deployment of nodes in a region of interest. …”
Get full text
Get full text
Thesis -
18
Automatic prehension using an accelerometer and force sensor
Published 2005“…Having the necessary components identified, built and tested, the apparatus can be used to investigate automatic control algorithms for secure grips on objects.…”
Get full text
Get full text
Conference or Workshop Item -
19
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
Published 2014“…The study shows that the developed algorithms MKPAES and DMAC increase the performance of the WSN and improve the system resistance to attacks on the WSN. …”
Get full text
Get full text
Thesis -
20
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project
