Search Results - (( data optimization method algorithm ) OR ( things application based algorithm ))

Refine Results
  1. 1

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
    Get full text
    Get full text
    Article
  2. 2

    A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications by Far Chen, Jong

    Published 2025
    “…The second layer employed spatial data and the fuzzy Technique for Order Preference by Similarity to Ideal Solution algorithm to refine potential solar energy sites, yielding the top 100 optimal locations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Today security is the important thing that we need to transfer data from location to another safely. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Hybrid metaheuristics for QOS-aware service composition / Hadi Naghavipour by Hadi , Naghavipour

    Published 2022
    “…An absolute majority of base algorithms for this problem were nature-inspired and population-based metaheuristics extended to complementary methods in hybrid solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    HDRA: A Haybird Data Reduction and Routing Algorithm by Hussein, M. K., Marghescu, Ion, A. M. Alduais, Nayef

    Published 2024
    “…Recent studies on data reduction methods have shown that sensor nodes often transmit data directly (single hop) to the base station (BS). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    HDRA: A Haybird Data Reduction and Routing Algorithm by M. K. Hussein, M. K. Hussein, Ion Marghescu, Ion Marghescu, Nayef A. M. Alduais, Nayef A. M. Alduais

    Published 2024
    “…Recent studies on data reduction methods have shown that sensor nodes often transmit data directly (single hop) to the base station (BS). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES) by Kamal Khairi Supaprhman

    Published 2022
    “…The natural evolution optimization algorithm which is genetic algorithm can be improve by combining the nature meta-heuristic algorithms which is bald eagle search to improve the makespan of genetic algorithm using cloudsim that need to be implement on the eclipse platform. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  10. 10
  11. 11

    Deep reinforcement learning online offloading for SWIPT multiple access edge computing network by Teckchai, Tiong, Ismail Saad, Tze, Kenneth Kin Teo, Herwansyah Lago

    Published 2021
    “…Simulation results are presented to demonstrate that the proposed algorithm is able to approach near-optimal performance and superior in decreasing tasks computation time compared with existing optimization methods, enabling real time optimal resource allocation and offloading achievable in a fast-fading wireless environment.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  12. 12

    Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions by Akhlaqi, Mohammad Yahya, Mohd Hanapi, Zurina

    Published 2023
    “…To fill this gap, a comprehensive survey is conducted using the mixed-method systematic literature review involving qualitative and quantitative data from the studied papers. …”
    Get full text
    Get full text
    Article
  13. 13

    Embedded Dual Band Rfid Based Blood Glucose Monitoring System For Internet Of Medical Things by Hamid, Shabinar Abdul

    Published 2020
    “…Manually recorded health information could lead to errors such as inaccurate patient identification and mismatch patient data that could seriously affect patient safety. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Lightweight ontology architecture for QoS aware service discovery and semantic CoAP data management in heterogeneous IoT environment by Sukhavasi, Suman, Perumal, Thinagaran, Mustapha, Norwati, Yaakob, Razali

    Published 2026
    “…User requests, transmitted via the Constrained Application Protocol (CoAP), are semantically enriched and matched to QoS parameters using Dynamic Shannon Entropy optimized with the Salp Swarm Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications by IZZAH NILAMSYUKRIYAH, BUANG, Kartinah, Zen, Syahrul Nizam, Junaini

    Published 2025
    “…However, the mobility of IoT devices introduces challenges in optimizing energy efficiency. This study provides a comprehensive review of energy-efficient routing algorithms for LoRaWAN in mobile IoT applications. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…These two models are based on topological placement method. DM is optimized using genetic algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  17. 17

    Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm by Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad

    Published 2024
    “…This research introduces the improved Archimedes optimization algorithm (IAOA) for data-driven modeling of continuous-time Hammerstein models with missing data. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Evaluation of cloud 3D printing services oriented toward the product life cycle based on a triangular fuzzy number complementary judgment matrix by Zhang, Chenglei, Li, Xiaoqian, Liu, Jiajia, Zhang, Yuanming, Zainudin, Edi Syams, Xu, Bo, Zhou, Sheng Fei, As’arry, Azizan Bin, Ismai, Mohd Idris Shah

    Published 2024
    “…Notably, the fuzzy analytic hierarchy process (FAHP) algorithm, a core component of our approach, has demonstrated exceptional problem-solving capabilities and unparalleled optimization of performance. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  20. 20