Search Results - (( iot implementation based algorithm ) OR ( java application using algorithm ))
Search alternatives:
- implementation based »
- iot implementation »
- java application »
- using algorithm »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
2
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
3
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…Understanding and comparing algorithms implemented in IoT devices, regarding performance discussed in this paper. …”
Get full text
Get full text
Article -
4
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. …”
Get full text
Get full text
Get full text
Article -
5
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
7
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…The attribute reduction technique is implemented with Matlab. The EECPD and GAEIWPSO algorithms are implemented with Python and Networkx simulators while DTOA algorithm is implemented with iFogSim to demonstrate the efficiency of the proposed scheme. …”
Get full text
Get full text
Thesis -
8
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
9
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Implementation and analysis of an updating data strategy on iot-waspmote gases testbed with 2.4 ghz xbee for air quality application
“…Overall, EDCD algorithm showed acceptable performance for IoT-Waspmote Gases Testbed with 2.4 GHz XBee. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The base-work paper of the research presents an improvement of DRAND algorithm based on energy consumption in IoT WSN to enhance the node energy consumption and iv increase the network lifetime. …”
Get full text
Get full text
Thesis -
12
-
13
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…In light of the aforementioned issues, this thesis presents a lightweight, scalable, and secure authentication framework for IoT networks based on blockchain technology. First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
Get full text
Get full text
Thesis -
14
IOT BASED CAR PARKING MANAGEMENT SYSTEM USING CAR PLATE RECOGNITION
Published 2019“…Hence, an IoT based car parking management system using car plate recognition is proposed. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
15
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…In this work, we focus our review on activity recognition implementation strategies by examining various sensors and sensing technologies used to collect useful data from IoT devices, reviewing preprocessing and feature extraction techniques, as well as classification algorithms used to recognize human activities in smart homes. …”
Get full text
Get full text
Article -
16
-
17
Enhancing indoor positioning service for location based internet of things (IoT): a source selecting approach with error compensation
Published 2017Get full text
Get full text
Conference or Workshop Item -
18
Performance Analysis In IoT Based Home Automation Using Hybrid RS-LDPC Codes
Published 2018“…In home automation system based on IoT, user-requested operations may have malfunction problems when bits error gets generated due to heavy noise in the fading channel. …”
Get full text
Get full text
Monograph -
19
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
Published 2020“…This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project
