Search Results - (( java implementation using algorithm ) OR ( using iot protocol algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- protocol algorithm »
- using algorithm »
- iot protocol »
-
1
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…The proposed routing algorithm is simulated using MATLAB for performance evaluations. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…The proposed protocol security performance is analyzed using cryptographic protocols verifier software and tested. …”
Get full text
Get full text
Article -
3
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Reliable low power network protocol in IoT for agriculture field
Published 2024“…The data link layer protocol handles the Medium Access Control (MAC) of the mesh network efficiently using algorithms based on the Scheduling sub-cycle of the Fast, Adaptive, and Energy-efficient Multi-channel-multi-path (FAEM) protocol by Liew et al. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…The blockchain structure requires a consensus algorithm that is lightweight, efficient and meets the computational limitations of the IoT devices. …”
Get full text
Get full text
Thesis -
7
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Published 2023“…Internet of Things (IoT) enables device and machine communication using TCP/IP protocol. …”
Get full text
Get full text
Thesis -
8
Routing protocols performance on 6LoWPAN IoT networks
Published 2025“…In the context of 6LoWPAN, Internet of Things (IoT) devices with limited resources can now seamlessly connect to the network using IPv6. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
10
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…Essentially, this paper exhibited the use of transport layer data (User Datagram Protocol - UDP) generated through IoT devices. …”
Get full text
Get full text
Article -
11
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…The proposed model is useful in enhancing the existing MAC protocol to support dense IoT deployment of RFID.…”
Get full text
Get full text
Article -
12
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…The Internet of Things (IoT) is an expanding paradigm of object connectivity using a range of resource types and architectures to deliver ubiquitous and requested services. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
14
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
15
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…In this work, we focus our review on activity recognition implementation strategies by examining various sensors and sensing technologies used to collect useful data from IoT devices, reviewing preprocessing and feature extraction techniques, as well as classification algorithms used to recognize human activities in smart homes. …”
Get full text
Get full text
Article -
16
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
17
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
18
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
19
Development of wireless data acquisiton system using LoRa technology for construction of PID control system
Published 2025text::Thesis -
20
Real-time and predictive analytics of air quality with IoT system: A review
Published 2020“…(iv) Data analytics for Air Pollution Index (API) prediction along with IoT, with various communication protocols can as-sist in the development of real-time, and continuous high precision environmen-tal monitoring systems. v) Machine Learning (ML) Regression algorithm is suit-able for prediction and classification of concentration gas pollutant, while ANN and SVM algorithm is used for forecasting.…”
Get full text
Get full text
Get full text
Book Chapter
