Search Results - (( java segmentation using algorithm ) OR ( iot implementation challenges algorithm ))
Search alternatives:
- challenges algorithm »
- iot implementation »
- java segmentation »
- using algorithm »
-
1
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. …”
Get full text
Get full text
Get full text
Article -
2
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…IoT is considered a widely recognized implementation that includes intelligent health care, intelligent transport, and intelligent grids. …”
Get full text
Get full text
Article -
4
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…As it is challenging to implement security in resource-constrained IoT networks, the presented model adopted bioinspired approaches, offering an improved version of ACO towards secure data transmission cost-effectively while taking into consideration residual energy and the trust score of the sensor to be optimized. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications
Published 2025“…Even though 5G technology has significantly improved connectivity and data transmission rates, the increasing number of IoT devices creates processing challenges. This study focuses on a Fog Optimized Computing System (FOCS) algorithm, which is developed to handle network congestion and processing challenges imposed by the increasing number of IoT devices. …”
Get full text
Get full text
Get full text
Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
Get full text
Get full text
Thesis -
8
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…This technique is challenged by the nature of IoT technology and perceived data, as well as by human differences, which necessitated additional processing tasks to select significant features for the learning algorithms. …”
Get full text
Get full text
Article -
9
Smart IoT energy optimisation and localisation monitoring for e-bike sharing
Published 2025“…However, existing systems face challenges such as limited input parameters for modeling, leading to inefficiencies in energy optimization algorithms and power assist mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. …”
Get full text
Get full text
Thesis -
11
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
12
FPGA-Based Lightweight Hardware Architecture of the PHOTON Hash Function for IoT Edge Devices
Published 2020“…The design of cryptographic engines for the Internet of Things (IoT) edge devices and other ultralightweight devices is a crucial challenge. …”
Get full text
Get full text
Article -
13
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
Published 2024“…However, the limitations of IoT devices have led to computation cost challenges and the need for a lightweight authentication scheme. …”
Get full text
Get full text
Get full text
Thesis -
14
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…However, the limitations of the IoT devices such as processing capability, storage, and energy are challenging. …”
Get full text
Get full text
Article -
15
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications
Published 2025“…However, the mobility of IoT devices introduces challenges in optimizing energy efficiency. …”
Get full text
Get full text
Get full text
Article -
17
Internet of Things (IoT) applications for estrus detection and management in precision livestock farming: a review
Published 2026“…Recent advancements in the Internet of Things (IoT) have introduced new opportunities to enhance estrus detection through the integration of sensors, data analytics, and machine learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Lightweight cryptographic hash functions: design trends, comparative study, and future directions
Published 2022“…Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Full-stack MQTT-based IoT system using two-tier networking
Published 2025“…This project addresses these challenges by implementing a WMN that eliminates single points of failure and adapts to dynamic factory floor environments. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Trust-aware authentication and authorization for IoT: a federated machine learning approach
Published 2024“…The proposed solution for AA IoT utilizes a trust calculation algorithm based on Federated Learning (FL), which is suitable for IoT environments and enables data privacy and scalability. …”
Get full text
Get full text
Get full text
Get full text
Article
