Search Results - (( iot implementation using algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment by Khalifa, Othman Omran, Ahmed, Muhammed Zaharadeen, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    TDMA scheduling analysis of energy consumption for iot wireless sensor network by Islam, Md Ashikul

    Published 2019
    “…The major objective for this project is to re-implement the proposed Energy Topology DRAND (E-T-DRAND) algorithm in IoT WSN using time slot allocation method and allocate nodes together with the node energy information and compare the obtained results with the corresponding results in the base paper. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An efficient IoT-based smart water meter system of smart city environment by Al-Madhrahi, R., Abdullah, J., Alduais, N. A. M., Mahdin, H.B., Saad, A. -M. H. Y., Nasser, A. B., Alduais, H. S.

    Published 2021
    “…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis by Akash, Nazmus Sakib, Rouf, Shakir, Jahan, Sigma, Chowdhury, Amlan, Uddin, Jia

    Published 2022
    “…This paper represents a model that accounts for the detection of botnets through the use of machine learning algorithms. The model examined anomalies, commonly referred to as botnets, in a cluster of IoT devices attempting to connect to a network. …”
    Get full text
    Get full text
    Article
  10. 10

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…IoT is considered a widely recognized implementation that includes intelligent health care, intelligent transport, and intelligent grids. …”
    Get full text
    Get full text
    Article
  11. 11

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…This was achieved through data transfer using Amazon Web Service (AWS-IoT) cloud connection. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…The Internet of Things (IoT) is an expanding paradigm of object connectivity using a range of resource types and architectures to deliver ubiquitous and requested services. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Internet of Things (IoT) based activity recognition strategies in smart homes: a review by Babangida, Lawal, Perumal, Thinagaran, Mustapha, Norwati, Yaakob, Razali

    Published 2022
    “…In this work, we focus our review on activity recognition implementation strategies by examining various sensors and sensing technologies used to collect useful data from IoT devices, reviewing preprocessing and feature extraction techniques, as well as classification algorithms used to recognize human activities in smart homes. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    IOT BASED CAR PARKING MANAGEMENT SYSTEM USING CAR PLATE RECOGNITION by Yip, Zhi Chuan

    Published 2019
    “…Hence, an IoT based car parking management system using car plate recognition is proposed. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications by Rafique, Majid

    Published 2025
    “…By using a task scheduling and offloading method, the FOCS algorithm arranges data according to size and sends it to the appropriate fog nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…The objective of this project is to design a synthesizable SHA-3 with 256-bits hash output and 1600-bits state array with lower area compared to Intel Microelectronic SHA-3. This research implements the SHA-3 in ways such that all the step mapping algorithms are logically combined to only use the input lanes of the state array to eliminate the intermediate logics and reduces the area size. …”
    Get full text
    Get full text
    Thesis
  20. 20