Search Results - (( things application _ algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Vulnerability detection algorithm of lightweight linux internet of things application with symbolic execution method by Li, Hongrui

    Published 2021
    “…Vulnerability detection algorithm of lightweight linux internet of things application with symbolic execution method by Li, Hongrui…”
    Get full text
    article
  4. 4

    Intelligent Multi-cellular Network Connectivity for Internet of Things Applications by Gsangaya K.R., Hajjaj S.S.H., Hashim W., Razali R.A.

    Published 2023
    “…Cost effectiveness; Mobile telecommunication systems; Modems; Quality of service; Wireless networks; Cellular network; Computing devices; Internet of thing application; Internet of thing networking; Network connectivity; Network selection; Network selection algorithm; Prototype modem; Selection algorithm; Single-networks; Internet of things…”
    Conference Paper
  5. 5
  6. 6
  7. 7

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9

    Security factors based evaluation of verification algorithm for an IoT access system by Al-Ghaili A.M., Kasim H., Othman M., Hassan Z.

    Published 2023
    “…Soft computing; Internet of Things (IOT); QR tag; Security Architecture; Security factors; Security objectives; Smart access; Smart city applications; Verification algorithms; Internet of things…”
    Conference Paper
  10. 10

    A dynamic replication aware load balanced scheduling for data grids in distributed environments of internet of things by Bakhshad, Said, Noor, Rafidah Md, Akhundzada, Adnan, Saba, Tanzila, Ahmedy, Ismail, Haroon, Faisal, Nazir, Babar

    Published 2018
    “…The simulation of the proposed algorithm shows promising results and better performance compared to the current state-of-the-art Modified Dynamic Hierarchical Replication (MDHR) algorithm. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Performance analysis of constrained device virtualization algorithm by Haseeb, Shariq, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ismail, Ahmad Faris

    Published 2020
    “…In more recent research, there have been theoretical proposals to virtualize constrained devices to abstract their data so that its always available to applications. We have adopted this technique in our research to virtualize the entire Internet of Things network so that virtual TCP/IP based protocols can operate on virtual networks for enabling interoperability. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Smart verification algorithm for IoT applications using QR tag by Al-Ghaili A.M., Kasim H., Rahim F.A., Ibrahim Z.-A., Othman M., Hassan Z.

    Published 2023
    “…Electrical engineering; Mathematical techniques; Brute-force attack; Information leakage; Internet of Things (IOT); QR tag; Security objectives; Smart applications; Unauthorized access; Verification algorithms; Internet of things…”
    Conference Paper
  20. 20

    Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System by Nwogbaga, Nweso Emmanuel

    Published 2023
    “…The application of the Internet of Things (IoT) is increasing to almost all aspects of human endevour. …”
    Get full text
    Get full text
    Thesis