Search Results - (( security application sensor algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- security application »
- application testing »
- application sensor »
- testing algorithm »
- sensor algorithm »
- java application »
-
1
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
Get full text
Get full text
Get full text
Thesis -
3
Vault’s floor security sensor with RFID access using microcontroller: article / Mohd Firdouz Bahtiar
Published 2009“…The system uses a microcontroller for the simple algorithm of the signal processing. The algorithm for the RFID access and the security sensor was commercial software to control the microcontroller and interfacing circuits.…”
Get full text
Get full text
Article -
4
Vault's floor security sensor with RFID access using microcontroller/ Mohd Firdouz Bahtiar
Published 2009“…A solution to these problems is to design an embedded system that provides an application of RFID for access and a photo sensor for the guarding system that runs on low power and at a lower cost to compare to the commercialize security sensor. …”
Get full text
Get full text
Thesis -
5
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Multi-level security algorithm for randon ZigBee Wireless Sensor Network
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
7
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so the implementation of security in such a restrictive environment is a challenging task. …”
Get full text
Get full text
Get full text
Article -
10
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Secure routing using frequency hopping in wireless sensor network
Published 2007“…Hence, such networks enable a variety of consumer applications, such as emergency rescue, disaster relief, smart homes and patient monitoring, industrial applications, such as structural health monitoring and environmental control, and military applications, such as target identification and tracking. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
-
15
Adaptive data collection algorithm for wireless sensor networks
Published 2008Get full text
Get full text
Article -
16
-
17
Development of security in wireless sensor network using IPv6
Published 2009“…This leads to a very demanding environment in providing security. The research proposed XOR encryption algorithm that possesses built-in and enhanced security measure. …”
Get full text
Get full text
Thesis -
18
Pyroelectric infrared sensor for intruder detection
Published 2004“…This paper discusses the application of pyroelectric infrared sensor (PIR) and the application of processing algorithm in handling sensor information so as to provide real time occupancy map on computer in control unit. …”
Get full text
Conference or Workshop Item -
19
-
20
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal
