Search Results - (( developing security sensor algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2021
    “…In this paper, a secure bio-inspired WSN (Wireless Sensor Network) routing protocol based on ant colony optimization (ACO) algorithm for IoT has been proposed and analyzed to find secure and optimal path that is energy-efficient as well as aiming at providing trust in IoT environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…The trust evaluation system has been enhanced in the development of the proposed routing algorithm and the node trust value is evaluated, sensor node misbehavior is identified, and energy conservation is maximized. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7

    Revolutionizing Perimeter Intrusion Detection: A Machine Learning-Driven Approach with Curated Dataset Generation for Enhanced Security by Pitafi, S., Anwar, T., Dewa Made Widia, I., Yimwadsana, B.

    Published 2023
    “…To solve the above problem, we designed a prototype for PIDS using a DHT22 temperature and humidity sensor, vibration sensor SW- 420 Module Pinout, Mini PIR motion sensor, and Arduino UNO. …”
    Get full text
    Get full text
    Article
  8. 8

    Pyroelectric infrared sensor for intruder detection by Moghavvemi, M., Seng, L.C.

    Published 2004
    “…This paper discusses the application of pyroelectric infrared sensor (PIR) and the application of processing algorithm in handling sensor information so as to provide real time occupancy map on computer in control unit. …”
    Get full text
    Conference or Workshop Item
  9. 9

    Development of a robotic hand glove system for secure grasp with AI wireless sensor data by Almassri, Ahmed, Koyanagi, Ken'ichi, Wada, Chikamune, Horio, Keiichi, Wan Hasan, Wan Zuha

    Published 2023
    “…Robotic Hand glove is one of the most commonly used technique in the rehabilitation systems. In this paper, we developed a robotic hand system with a proposed sensing mechanism-based AI algorithm, which can acquire grasping forces from human fingers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Energy-efficient intrusion detection in wireless sensor network by Salehian, Solmaz, Masoumiyan, Farzaneh, Udzir, Nur Izura

    Published 2012
    “…The use of Wireless Sensor Networks (WSNs) has developed rapidly in the last decade. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…In addition, the security of the scheme was informally analysed to demonstrate that the scheme is secure from different attacks, e.g., sensor capture, replay, and other network and physical attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Minimising coverage holes for prediction-based mobile object target tracking in wireless sensor networks by Ali, Khalid Abdullahi

    Published 2017
    “…Hence, work presented in this thesis could be useful to WSN algorithms developers, and also to people who plan the deployment of nodes in a region of interest. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Automatic prehension using an accelerometer and force sensor by Ahmad, Siti Anom, Chappell, Paul H., Ali, Mohd Liakot

    Published 2005
    “…Having the necessary components identified, built and tested, the apparatus can be used to investigate automatic control algorithms for secure grips on objects.…”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol by Al-Alak, Saif M. Kh.

    Published 2014
    “…The study shows that the developed algorithms MKPAES and DMAC increase the performance of the WSN and improve the system resistance to attacks on the WSN. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming by Altahir, A.A., Asirvadam, V.S., Sebastian, P., Hamid, N.H.B., Ahmed, E.F.

    Published 2022
    “…Then, the dynamic programming algorithm operates on security quantified maps rather than uniform grids. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network by Ramli, Sofia Najwa

    Published 2016
    “…While the result of FFT algorithm summarizes that the number of the common FFT peak location index for sensors on the same subject is significantly higher compared to the number of common feature for sensors on different subjects.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A secure data authentication in wireless body area network for health monitoring using electrocardiogram-based key agreement by Ramli, Sofia Najwa, Ahmad, Rabiah, Abdollah, Mohd Faizal

    Published 2016
    “…Due to the uniqueness and the permanence property of ECG signal, the proposed model is developed to achieve optimal security performance and required lightweight manners of to the resource-limited biomedical sensors. …”
    Get full text
    Get full text
    Get full text
    Article