Search Results - (( java application optimized algorithm ) OR ( iot implementation from algorithm ))
Search alternatives:
- optimized algorithm »
- implementation from »
- iot implementation »
- java application »
- from algorithm »
-
1
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…The attribute reduction technique is implemented with Matlab. The EECPD and GAEIWPSO algorithms are implemented with Python and Networkx simulators while DTOA algorithm is implemented with iFogSim to demonstrate the efficiency of the proposed scheme. …”
Get full text
Get full text
Thesis -
2
Implementation and analysis of an updating data strategy on iot-waspmote gases testbed with 2.4 ghz xbee for air quality application
“…Overall, EDCD algorithm showed acceptable performance for IoT-Waspmote Gases Testbed with 2.4 GHz XBee. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
5
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
6
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
8
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
Get full text
Get full text
Thesis -
9
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…To secure IoT networks from routing attacks, a secure trust aware ACO-based WSN routing protocol for IoT is proposed here that establishes secure routing with trustworthy nodes. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
12
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…In this work, we focus our review on activity recognition implementation strategies by examining various sensors and sensing technologies used to collect useful data from IoT devices, reviewing preprocessing and feature extraction techniques, as well as classification algorithms used to recognize human activities in smart homes. …”
Get full text
Get full text
Article -
13
Home intruder detection system using machine learning and IoT
Published 2022“…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
Get full text
Get full text
Get full text
Article -
14
-
15
ON CAMPUS IOT DEMONSTRATION FOR STUDENT HOTSPOT TRACKING USING WIRELESS SENSORS NETWORK AND INTEGRATED SOFTWARE PLATEFORM
Published 2017“…Based on this approximate distance value from RSSI, this project will implement triangulation algorithm to estimate the location of a receiver based on the 3 estimated that send by the three known receiver.…”
Get full text
Get full text
Final Year Project -
16
Performance Analysis In IoT Based Home Automation Using Hybrid RS-LDPC Codes
Published 2018“…The error detection and correction algorithms implemented in home automation system is successfully developed by encoding and decoding the text messages that transmitted from webpage to Raspberry Pi board using Python and HTML programming language. …”
Get full text
Get full text
Monograph -
17
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
18
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
Published 2020“…The results demonstrate the efficiency of deep learning algorithms when detecting attacks from the transport layer. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Smart Irrigation System Using Raspberry Pi
Published 2020“…The irrigation is automated by using machine learning algorithm that has been implemented on the system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
Get full text
Get full text
Thesis
