Search Results - (( java implementation during algorithm ) OR ( iot implementation function algorithm ))
Search alternatives:
- implementation function »
- implementation during »
- java implementation »
- iot implementation »
- function algorithm »
- during algorithm »
-
1
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…This research implements the SHA-3 in ways such that all the step mapping algorithms are logically combined to only use the input lanes of the state array to eliminate the intermediate logics and reduces the area size. …”
Get full text
Get full text
Thesis -
2
FPGA-Based Lightweight Hardware Architecture of the PHOTON Hash Function for IoT Edge Devices
Published 2020“…Therefore, to improve the area-performance trade-offs of PHOTON hash function, an iterative architecture is implemented in this work. …”
Get full text
Get full text
Article -
3
Lightweight cryptographic hash functions: design trends, comparative study, and future directions
Published 2022“…However, due to the limitations of IoT devices, existing cryptographic hash functions are not suitable for all IoT environments. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
ESS-IoT: The Smart Waste Management System for General Household
Published 2024“…The ESS-IoT system uses Raspberry Pi 4b as the microcontroller with three modules, and it is designed with two main functions: waste collection and waste classification. …”
Article -
5
A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach
Published 2022“…The solution takes the layout of sensor nodes as input and generates a set of proposed IoT gateway locations. The framework generates the solution using genetic algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
-
7
-
8
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
10
Internet of things (IoT) based grid tension monitoring system
Published 2022Get full text
Get full text
Undergraduates Project Papers -
11
-
12
Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas
Published 2023“…The system's effectiveness and functionality are demonstrated through real-life implementation. …”
Get full text
Get full text
Get full text
Article -
13
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
14
Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas
Published 2023“…The system's effectiveness and functionality are demonstrated through real-life implementation. …”
Get full text
Get full text
Get full text
Article -
15
Evaluation of Security Metric for Artificial Internet of Things Smart Locking System
Published 2023“…In terms of hardware implementation, a microcontroller is chose, and a testing environment is established to explore and enhances security measures. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
A highly efficient algorithm for phased-array mmWave massive MIMO beamforming
Published 2021“…Simulation results show that the proposed algorithm significantly improves system performance and reduces computational complexity by more than 45% compared to traditional algorithms.…”
Get full text
Get full text
Article -
18
Face reidentification system to track factory visitors using OpenVINO
Published 2020“…Fortunately, developer may abstract away this difficulty by implement OpenVINO onto IoT devices and make it use CPU to inference on real time. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
20
Development of location estimation algorithm utilizing RSSI for LoRa positioning system
Published 2021“…Lastly, the Cumulative Density Function (CDF) shows 90% of the localization algorithm error for LOS is lower than 0.82 meters while for NLOS is 1.17 meters.…”
Get full text
Get full text
Get full text
Article
