Search Results - (( iot implementation function algorithm ) OR ( java data control algorithm ))
Search alternatives:
- implementation function »
- iot implementation »
- function algorithm »
- data control »
- java »
-
1
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…This research implements the SHA-3 in ways such that all the step mapping algorithms are logically combined to only use the input lanes of the state array to eliminate the intermediate logics and reduces the area size. …”
Get full text
Get full text
Thesis -
2
FPGA-Based Lightweight Hardware Architecture of the PHOTON Hash Function for IoT Edge Devices
Published 2020“…Therefore, to improve the area-performance trade-offs of PHOTON hash function, an iterative architecture is implemented in this work. …”
Get full text
Get full text
Article -
3
Lightweight cryptographic hash functions: design trends, comparative study, and future directions
Published 2022“…However, due to the limitations of IoT devices, existing cryptographic hash functions are not suitable for all IoT environments. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
ESS-IoT: The Smart Waste Management System for General Household
Published 2024“…The ESS-IoT system uses Raspberry Pi 4b as the microcontroller with three modules, and it is designed with two main functions: waste collection and waste classification. …”
Article -
5
A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach
Published 2022“…The solution takes the layout of sensor nodes as input and generates a set of proposed IoT gateway locations. The framework generates the solution using genetic algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
-
7
-
8
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
Get full text
Get full text
Monograph -
9
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item -
10
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
11
Internet of things (IoT) based grid tension monitoring system
Published 2022Get full text
Get full text
Undergraduates Project Papers -
12
A random search based effective algorithm for pairwise test data generation
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Automated time series forecasting
Published 2011“…Moving Average, Decomposition, Exponential Smoothing, Time Series Regressions and ARIMA) were used.The algorithm was developed in JAVA using up to date forecasting process such as data partition, several error measures and rolling process.Successfully, the results of the algorithm tally with the results of SPSS and Excel.This automatic forecasting will not just benefit forecaster but also end users who do not have in depth knowledge about forecasting techniques.…”
Get full text
Get full text
Get full text
Monograph -
15
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…Therefore, a replica control protocol must consider the dynamic aspects of the Data Grid. …”
Get full text
Get full text
Thesis -
16
Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas
Published 2023“…The system's effectiveness and functionality are demonstrated through real-life implementation. …”
Get full text
Get full text
Get full text
Article -
17
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas
Published 2023“…The system's effectiveness and functionality are demonstrated through real-life implementation. …”
Get full text
Get full text
Get full text
Article -
19
Evaluation of Security Metric for Artificial Internet of Things Smart Locking System
Published 2023“…In terms of hardware implementation, a microcontroller is chose, and a testing environment is established to explore and enhances security measures. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
