Search Results - (( developing security sensor algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- sensor algorithm »
- java implication »
- security sensor »
-
1
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…In this paper, a secure bio-inspired WSN (Wireless Sensor Network) routing protocol based on ant colony optimization (ACO) algorithm for IoT has been proposed and analyzed to find secure and optimal path that is energy-efficient as well as aiming at providing trust in IoT environment. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…The trust evaluation system has been enhanced in the development of the proposed routing algorithm and the node trust value is evaluated, sensor node misbehavior is identified, and energy conservation is maximized. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Development of security in wireless sensor network using IPv6
Published 2009Get full text
Get full text
Thesis -
7
Revolutionizing Perimeter Intrusion Detection: A Machine Learning-Driven Approach with Curated Dataset Generation for Enhanced Security
Published 2023“…To solve the above problem, we designed a prototype for PIDS using a DHT22 temperature and humidity sensor, vibration sensor SW- 420 Module Pinout, Mini PIR motion sensor, and Arduino UNO. …”
Get full text
Get full text
Article -
8
Pyroelectric infrared sensor for intruder detection
Published 2004“…This paper discusses the application of pyroelectric infrared sensor (PIR) and the application of processing algorithm in handling sensor information so as to provide real time occupancy map on computer in control unit. …”
Get full text
Conference or Workshop Item -
9
Development of a robotic hand glove system for secure grasp with AI wireless sensor data
Published 2023“…Robotic Hand glove is one of the most commonly used technique in the rehabilitation systems. In this paper, we developed a robotic hand system with a proposed sensing mechanism-based AI algorithm, which can acquire grasping forces from human fingers. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Energy-efficient intrusion detection in wireless sensor network
Published 2012“…The use of Wireless Sensor Networks (WSNs) has developed rapidly in the last decade. …”
Get full text
Get full text
Conference or Workshop Item -
12
Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities
Published 2021“…In addition, the security of the scheme was informally analysed to demonstrate that the scheme is secure from different attacks, e.g., sensor capture, replay, and other network and physical attacks. …”
Get full text
Get full text
Get full text
Article -
13
Minimising coverage holes for prediction-based mobile object target tracking in wireless sensor networks
Published 2017“…Hence, work presented in this thesis could be useful to WSN algorithms developers, and also to people who plan the deployment of nodes in a region of interest. …”
Get full text
Get full text
Thesis -
14
Automatic prehension using an accelerometer and force sensor
Published 2005“…Having the necessary components identified, built and tested, the apparatus can be used to investigate automatic control algorithms for secure grips on objects.…”
Get full text
Get full text
Conference or Workshop Item -
15
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
Published 2014“…The study shows that the developed algorithms MKPAES and DMAC increase the performance of the WSN and improve the system resistance to attacks on the WSN. …”
Get full text
Get full text
Thesis -
16
Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming
Published 2022“…Then, the dynamic programming algorithm operates on security quantified maps rather than uniform grids. …”
Get full text
Get full text
Article -
17
-
18
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…The secure node authentication algorithm prevents attacks from accessing the network. …”
Get full text
Get full text
Article -
19
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…While the result of FFT algorithm summarizes that the number of the common FFT peak location index for sensors on the same subject is significantly higher compared to the number of common feature for sensors on different subjects.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
A secure data authentication in wireless body area network for health monitoring using electrocardiogram-based key agreement
Published 2016“…Due to the uniqueness and the permanence property of ECG signal, the proposed model is developed to achieve optimal security performance and required lightweight manners of to the resource-limited biomedical sensors. …”
Get full text
Get full text
Get full text
Article
