Search Results - (( iot implementation level algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- implementation level »
- iot implementation »
- data normalization »
- level algorithm »
- java »
-
1
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The algorithm use time division multiplexing algorithm together with hello message to allocate the neighbors and their energy level to find the best way to communicate and reduce packet drop, less signal interference and increase throughput. …”
Get full text
Get full text
Thesis -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
Trust-aware authentication and authorization for IoT: a federated machine learning approach
Published 2024“…Using real-world data collected from Zigbee Zolertia Z1 devices, a Federated Machine Learning model was developed that utilizes Physical Layer properties such as Received Signal Strength Indicator (RSSI), Link Quality Indicator (LQI), device Internal Temperature, device Battery Level, and device MAC address. The proposed solution for AA IoT utilizes a trust calculation algorithm based on Federated Learning (FL), which is suitable for IoT environments and enables data privacy and scalability. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart IoT energy optimisation and localisation monitoring for e-bike sharing
Published 2025“…To address these challenges, this project developed a Smart IoT Energy Optimization and Localization Monitoring System that integrates multi-sensor data, IoT connectivity, and advanced data analytics to monitor real-time usage patterns, battery levels, and the location of e-bikes. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
6
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
Published 2024“…However, the limitations of IoT devices have led to computation cost challenges and the need for a lightweight authentication scheme. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas
Published 2023“…The innovative, cost-effective, and user-friendly FMWS employs an HC-SR04 ultrasonic sensor with an Arduino microcontroller to measure flood levels and determine their status. Real-time data regarding flood levels and associated risk levels (safe, alert, cautious, or dangerous) are updated on The Things Network and integrated into TagoIO and ThingSpeak IoT platforms through a custom-built LoRaWAN gateway. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas
Published 2023“…The innovative, cost-effective, and user-friendly FMWS employs an HC-SR04 ultrasonic sensor with an Arduino microcontroller to measure flood levels and determine their status. Real-time data regarding flood levels and associated risk levels (safe, alert, cautious, or dangerous) are updated on The Things Network and integrated into TagoIO and ThingSpeak IoT platforms through a custom-built LoRaWAN gateway. …”
Get full text
Get full text
Get full text
Article -
10
Automatic nutrient mixer and pH Level for hydroponic application / Hariz Akmal Azizan
Published 2024“…Future work could involve integrating advanced machine learning algorithms to optimize nutrient dosing and implement self-harvesting mechanisms, thereby enhancing plant production and contributing to the development of more efficient and sustainable hydroponic systems for agricultural practices.…”
Get full text
Get full text
Student Project -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
12
Smart grid system / Abdul Rahman Musrael
Published 2024“…Balancing supply and demand in real-time and maintaining stability in frequency and voltage levels. The objective of this final year project is to modernize the existing grid system by implementing a smart grid that utilizes microcontrollers for efficient energy management and continuous monitoring. …”
Get full text
Get full text
Student Project -
13
A method for preserving battery life in wireless sensor nodes for LoRa based IOT flood monitoring
Published 2022“…A common challenge in the implementation of Internet of Things (IOT) Wireless Sensor Networks (WSN) is that the sensor nodes are known to be power hungry devices. …”
Get full text
Get full text
Get full text
Article -
14
Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system
Published 2022“…The AllThingsTalkMaker IoT server is integrated into the TTN to be accessed using Web/mobile application interfaces. …”
Get full text
Get full text
Get full text
Article -
15
Prototyping a lightweight encryption on a field programmable gate array for securing tele-control data
Published 2023Conference Paper -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
17
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…Preventing DoS at the network or infrastructure level typically depends on implementing an IDS. This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
18
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis
