Search Results - (( java implementation developing algorithm ) OR ( iot implementation connection algorithm ))

Refine Results
  1. 1

    Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain by Muhammad, Norhidayah, Mohamad Zain, Jasni

    Published 2019
    “…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. CP-ABE algorithm is one-to-many technique suitable for secure grouping communication, but this algorithm is not a lightweight feature. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System by Nwogbaga, Nweso Emmanuel

    Published 2023
    “…The attribute reduction technique is implemented with Matlab. The EECPD and GAEIWPSO algorithms are implemented with Python and Networkx simulators while DTOA algorithm is implemented with iFogSim to demonstrate the efficiency of the proposed scheme. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment by Khalifa, Othman Omran, Ahmed, Muhammed Zaharadeen, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis by Akash, Nazmus Sakib, Rouf, Shakir, Jahan, Sigma, Chowdhury, Amlan, Uddin, Jia

    Published 2022
    “…Various machine learning algorithms were also implemented upon the processed data for comparative analysis. …”
    Get full text
    Get full text
    Article
  6. 6

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Smart Irrigation System Using Raspberry Pi by Sahrom, Ahmad Syamil, Aminuddin, Raihah

    Published 2020
    “…The irrigation is automated by using machine learning algorithm that has been implemented on the system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A study on obstacle detection for IoT based automated guided vehicle (AGV) by Loh, Jit Hao, M. Nafis, O. Z.

    Published 2022
    “…Furthermore, the communication verification is diagnosed for the Wi-Fi connection broadcast traffic and network latency. The study produced several significant results related to obstacle detection of AGV with IoT based technology. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  10. 10

    Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications by IZZAH NILAMSYUKRIYAH, BUANG, Kartinah, Zen, Syahrul Nizam, Junaini

    Published 2025
    “…Among these, Low Power Wide Area Network (LPWAN) technologies - specifically Long-Range Wide Area Network (LoRaWAN) - offer long-distance wireless connectivity for IoT devices, characterized by their extended transmission range and minimal energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
    Get full text
    Get full text
    Thesis
  13. 13

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Smart IoT energy optimisation and localisation monitoring for e-bike sharing by Mohamed, Mawada Ahmed, Toha, Siti Fauziah, Rahman, Md Ataur, Khairudin, Moh.

    Published 2025
    “…The methodology involved integrating sensors to collect key data, implementing connectivity for real-time monitoring, and developing an energy optimization algorithm to prolong battery life, improving the efficiency of the e-bike sharing system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…HIDES is developed using the System Development Life Cycle (SDLC) approach. HIDES implements an object detection algorithm; Single-Shot Multibox Detection (SSD) in NVIDIA Jetson Nano to detect intruders through a camera connected to the system. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach by Kong, Zan Wai

    Published 2022
    “…The solution takes the layout of sensor nodes as input and generates a set of proposed IoT gateway locations. The framework generates the solution using genetic algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Routing protocols performance on 6LoWPAN IoT networks by Abdul Razak, Siti Fatimah, Pei, Siang Chia, Kamis, Noor Hisham, Yogarayan, Sumendra, S. M. M Yassin, S. M. Warusia Mohamed, Abdollah, Mohd Faizal

    Published 2025
    “…This result is valuable to further implement these protocols in the testbed as well as provide an idea of the algorithmic enhancements.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Internet of Things (IoT) based activity recognition strategies in smart homes: a review by Babangida, Lawal, Perumal, Thinagaran, Mustapha, Norwati, Yaakob, Razali

    Published 2022
    “…In this work, we focus our review on activity recognition implementation strategies by examining various sensors and sensing technologies used to collect useful data from IoT devices, reviewing preprocessing and feature extraction techniques, as well as classification algorithms used to recognize human activities in smart homes. …”
    Get full text
    Get full text
    Article
  19. 19

    Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications by Rafique, Majid

    Published 2025
    “…Even though 5G technology has significantly improved connectivity and data transmission rates, the increasing number of IoT devices creates processing challenges. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis