Search Results - (( iot implementation software algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- implementation software »
- optimisation algorithm »
- iot implementation »
- software algorithm »
- java application »
-
1
-
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
3
-
4
IOT BASED CAR PARKING MANAGEMENT SYSTEM USING CAR PLATE RECOGNITION
Published 2019Get full text
Get full text
Final Year Project Report / IMRAD -
5
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…The blockchain structure requires a consensus algorithm that is lightweight, efficient and meets the computational limitations of the IoT devices. …”
Get full text
Get full text
Thesis -
6
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…The second element, implementation of IoT is with the purpose of collecting surveillance data. …”
Get full text
Get full text
Monograph -
7
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…These features resulted in faster runtime compared to the more established RS A asymmetric encryption scheme, making AAp a potential alternative for IoT security. At the time of writing this thesis, AAḃ algorithm still exists as a mathematical concept and proven in a mathematical based software. …”
Get full text
Get full text
Thesis -
8
Lightweight cryptographic hash functions: design trends, comparative study, and future directions
Published 2022“…Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Wireless IoT smart door lock using Viola-Jones face detection technique / Samsiah Ahmad...[et al.]
Published 2020“…The fundamental system design, implementation of hardware and software as well as the data collection and processing techniques are described in this paper. …”
Get full text
Get full text
Get full text
Article -
10
Bundle Sorting Mobile Application
Published 2020“…The focus in the apparel industry is to ensure all the processes in the production line get the identical garments without any redundancy of the output process. By implementing the Internet of Thing (IoT) in the apparel industry, it will increase the efficiency of the garment’s quantity output process per day. …”
Get full text
Get full text
Final Year Project -
11
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…To secure these critical infrastructures, security measures should be examined and implemented. These methods could be hardware-based, such as Intrusion Detection Systems (IDS), software-based, or managerial-based. …”
Get full text
Get full text
Get full text
Article -
12
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
13
Face reidentification system to track factory visitors using OpenVINO
Published 2020“…Fortunately, developer may abstract away this difficulty by implement OpenVINO onto IoT devices and make it use CPU to inference on real time. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network
Published 2022“…The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Energy efficient routing protocols for wireless sensor networks: Comparison and future directions
Published 2017Get full text
Get full text
Conference or Workshop Item -
16
Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei
Published 2018“…The results obtained from the various experiments show the effectiveness of the proposed framework and algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Evaluation of arima and ann stream analytics for air quality monitoring system
Published 2021“…The data stored in the query table act as input to the analytics algorithm, which runs in R-server as well. In this thesis, two algorithms have been implemented and compared. …”
Get full text
Get full text
Thesis
