Search Results - (( deployment security optimization algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…For wireless sensor network (WSN) integrated dynamic IoT networks, this paper presents a trust-aware secure Ant colony optimization (ACO)-based routing algorithm to provide security while searching for an energy-efficient optimal routing path. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2
  3. 3

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A survey on cloudlet computation optimization in the mobile edge computing environment by Muwafaq, Layth, Noordin, Nor K., Othman, Mohamed, Ismail, Alyani, Hashim, Fazirulhisyam

    Published 2023
    “…MEC can optimize mobile device performance, enhance security and privacy, improve battery life, provide increased bandwidth, and reduce latency across wireless networks. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Multi-criteria optimization framework for cloudlet computing in WMANs: integrating VL-WIDE and AHP for enhanced decision-making by Muwafaq, Layth, Noordin, Nor K, Othman, Mohamed, Ismail, Alyani, Hashim, Fazirulhisyam

    Published 2026
    “…Our method employs a variable-length multi-objective whale optimization integrated with differential evolution (VL-WIDE) to tackle the optimization problem, dynamically adjusting to the WMAN environment while optimizing delay, energy consumption (both user device and cloudlet), and cloudlet deployment cost. …”
    Get full text
    Get full text
    Article
  9. 9

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…Compared to the Ant Colony Optimization-Genetic Algorithm (ACO-GA) and Ant Colony Optimization- Hierarchical Clustering Mechanism (ACOHCM), the ACO algorithm shows superior power savings and efficiency. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks by Ismail Abdullah, Kalid Abdlkader Marsal

    Published 2024
    “…In the following study, the radio bandwidth's energy consumption is the target under study, which in turn is predicted to optimize WSN.…”
    Article
  11. 11

    Machine learning-based anomaly detection in NFV: a comprehensive survey by Sehar Zehra, Ummay Faseeha, Hassan Jamil Syed, Fahad Samad, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…By providing insights into the most efficient algorithm for timely and effective anomaly detection in NFV networks, this study aims to assist network administrators and security professionals in enhancing the security of NFV deployments, thus safeguarding the integrity and performance of sensors and IoT systems.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Distribution network reconfiguration for transmission loss minimization and voltage profile Improvement using salp swarm optimization algorithm by Shanono, Ibrahim Haruna, Nor Rul Hasma, Abdullah, Nur Fajrina, Mohd Noh, Muhammad, Aisha

    Published 2022
    “…This tends to overload the transmission system, which results in an excessive power loss and subsequent system outage. Optimal reactive power dispatch (ORPD) is a mechanism deployed to ensure a secured operation as well as an economically viable power system network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Distribution network reconfiguration for transmission loss minimization and voltage profile improvement using salp swarm optimization algorithm by Shanono, Ibrahim Haruna, Nor Rul Hasma, Abdullah, Nur Fajrina, Mohd Noh, Muhammad, Aisha

    Published 2022
    “…This tends to overload the transmission system, which results in an excessive power loss and subsequent system outage. Optimal reactive power dispatch (ORPD) is a mechanism deployed to ensure a secured operation as well as an economically viable power system network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm by Muhamad Zahim, Sujod, Siti Nor Azlina, Mohd Ghazali, Mohd Fadzil, Abdul Kadir, Al-Shetwi, Ali Qasem

    Published 2024
    “…This paper introduces a Solar PV Smart Fault Diagnosis and Classification (SFDC) model that harnesses the Random Forest (RF) algorithm in conjunction with Cross-Validation (CV) and an optimized feature extraction (FE) set. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Comprehensive review of drones collision avoidance schemes: challenges and open issues by Rezaee, Mohammad Reza, Abdul Hamid, Nor Asilah Wati, Hussin, Masnida, Ahmad Zukarnain, Zuriati

    Published 2024
    “…In the contemporary landscape, the escalating deployment of drones across diverse industries has ushered in a consequential concern, including ensuring the security of drone operations. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Design and implementation of a private and public key crypto processor for next-generation it security applications by Hani, Mohamed Khalil, Wen, Hau Yuan, Paniandi, Arul

    Published 2006
    “…This paper presents the design and implementation of a crypto processor, a special-purpose embedded system optimized for the execution of cryptographic algorithms in hardware. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    SGM: Strategic Game Model for resisting node misbehaviour in IoT-Cloud ecosystem by Khan, Burhan Ul Islam, Anwar, Farhat, Abdul Rahman, Farah Diyana, Olanrewaju, Rashidah Funke, Goh, Khang Wen, Janin, Zuriati, Rahman, Md Arafatur

    Published 2022
    “…This paper introduces a computational strategic game model capable of mitigating the adversarial impact of node misbehaviour in large-scale Internet of Things (IoT) deployments. This security model’s central concept is to preclude the participation of misbehaving nodes during the routing process within the ad hoc environment of mobile IoT nodes. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway by Nurul Saliha A. Ibrahim, Nurul Saliha A. Ibrahim, Faiz A. Saparudin, Faiz A. Saparudin

    Published 2023
    “…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    SGM : Strategic game model for resisting node misbehaviour in IoT-cloud ecosystem by Khan, Burhan Ul Islam, Anwar, Farhat, Farah Diyana, Abdul Rahman, Olanrewaju, Rashidah Funke, Goh, Khang Wen, Zuriati, Janin, Rahman, Md Arafatur

    Published 2022
    “…This paper introduces a computational strategic game model capable of mitigating the adversarial impact of node misbehaviour in large-scale Internet of Things (IoT) deployments. This security model’s central concept is to preclude the participation of misbehaving nodes during the routing process within the ad hoc environment of mobile IoT nodes. …”
    Get full text
    Get full text
    Get full text
    Article