Search Results - (( deployment security optimization algorithm ) OR ( java a function algorithm ))
Search alternatives:
- security optimization »
- function algorithm »
- a function »
- java a »
- deployment »
-
1
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…For wireless sensor network (WSN) integrated dynamic IoT networks, this paper presents a trust-aware secure Ant colony optimization (ACO)-based routing algorithm to provide security while searching for an energy-efficient optimal routing path. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
-
3
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
A survey on cloudlet computation optimization in the mobile edge computing environment
Published 2023“…MEC can optimize mobile device performance, enhance security and privacy, improve battery life, provide increased bandwidth, and reduce latency across wireless networks. …”
Get full text
Get full text
Get full text
Article -
5
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article -
6
-
7
Multi-criteria optimization framework for cloudlet computing in WMANs: integrating VL-WIDE and AHP for enhanced decision-making
Published 2026“…Our method employs a variable-length multi-objective whale optimization integrated with differential evolution (VL-WIDE) to tackle the optimization problem, dynamically adjusting to the WMAN environment while optimizing delay, energy consumption (both user device and cloudlet), and cloudlet deployment cost. …”
Get full text
Get full text
Article -
8
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…Compared to the Ant Colony Optimization-Genetic Algorithm (ACO-GA) and Ant Colony Optimization- Hierarchical Clustering Mechanism (ACOHCM), the ACO algorithm shows superior power savings and efficiency. …”
Get full text
Get full text
Get full text
Thesis -
9
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…In the following study, the radio bandwidth's energy consumption is the target under study, which in turn is predicted to optimize WSN.…”
Article -
10
Machine learning-based anomaly detection in NFV: a comprehensive survey
Published 2023“…By providing insights into the most efficient algorithm for timely and effective anomaly detection in NFV networks, this study aims to assist network administrators and security professionals in enhancing the security of NFV deployments, thus safeguarding the integrity and performance of sensors and IoT systems.…”
Get full text
Get full text
Get full text
Get full text
Article -
11
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
12
Distribution network reconfiguration for transmission loss minimization and voltage profile Improvement using salp swarm optimization algorithm
Published 2022“…This tends to overload the transmission system, which results in an excessive power loss and subsequent system outage. Optimal reactive power dispatch (ORPD) is a mechanism deployed to ensure a secured operation as well as an economically viable power system network. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Distribution network reconfiguration for transmission loss minimization and voltage profile improvement using salp swarm optimization algorithm
Published 2022“…This tends to overload the transmission system, which results in an excessive power loss and subsequent system outage. Optimal reactive power dispatch (ORPD) is a mechanism deployed to ensure a secured operation as well as an economically viable power system network. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…This paper introduces a Solar PV Smart Fault Diagnosis and Classification (SFDC) model that harnesses the Random Forest (RF) algorithm in conjunction with Cross-Validation (CV) and an optimized feature extraction (FE) set. …”
Get full text
Get full text
Get full text
Article -
15
Comprehensive review of drones collision avoidance schemes: challenges and open issues
Published 2024“…In the contemporary landscape, the escalating deployment of drones across diverse industries has ushered in a consequential concern, including ensuring the security of drone operations. …”
Get full text
Get full text
Get full text
Article -
16
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
17
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…This paper presents the design and implementation of a crypto processor, a special-purpose embedded system optimized for the execution of cryptographic algorithms in hardware. …”
Get full text
Get full text
Get full text
Article -
19
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
SGM: Strategic Game Model for resisting node misbehaviour in IoT-Cloud ecosystem
Published 2022“…This paper introduces a computational strategic game model capable of mitigating the adversarial impact of node misbehaviour in large-scale Internet of Things (IoT) deployments. This security model’s central concept is to preclude the participation of misbehaving nodes during the routing process within the ad hoc environment of mobile IoT nodes. …”
Get full text
Get full text
Get full text
Article
