Search Results - (( developing iot selection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- selection algorithm »
- implication based »
- java implication »
- developing iot »
- iot selection »
-
1
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
2
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
4
Systematic review of intrusion detection system based on machine learning techniques for internet of things
Published 2023“…We highlighted the most efficient machine learning algorithms and feature selection techniques, along with strategies to address issues related to dataset imbalance in benchmarked datasets, with the goal of fostering the development of robust IDS solutions for IoT security.…”
Get full text
Get full text
Article -
5
Intersection Features For Android Botnet Classification
Published 2019“…Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
Get full text
Get full text
Get full text
Article -
6
Review and analysis of risk factor of maternal health in remote area using the Internet of Things (IoT)
Published 2020“…Regardless, few selected pregnant women’s data has been collected (through IoT enabled devices) and the same process also applied for this dataset also by using LMT. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Smart agriculture: precision farming through sensor-based crop monitoring and control system
Published 2024“…Subsequently, four distinct algorithms are trained with the collected dataset to ascertain the most optimal algorithm for predicting crop growth and harvesting time, resulting in the selection of the Random Forest Regression model, which attains the highest model score of 86%. …”
Get full text
Get full text
Get full text
Article -
8
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Chaotic map initializations with Tiki-Taka algorithm for software remodularization problem
Published 2021“…Addressing this issue, this paper evaluates the performance of automated software remodularization using the newly developed Tiki-Taka Algorithm (TTA) and its variants with four chaotic map initializations based on Chebyshev map, Circle map, Logistic Map and Piecewise Map. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A Survey on Distributed Topology Control Techniques for Extending the Lifetime of Battery Powered Wireless Sensor Networks
Published 2013“…Large-scale, self-organizing wireless sensor and mesh network deployments are being driven by recent technological developments such as The Internet of Things (IoT), Smart Grids and Smart Environment applications. …”
Get full text
Get full text
Citation Index Journal -
12
-
13
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
14
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
15
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
16
Development of wireless data acquisiton system using LoRa technology for construction of PID control system
Published 2025text::Thesis -
17
Design and development of smart parking system based on fog computing and internet of things
Published 2021“…Moreover, the parking‐spot selection process considers criteria that do not maximize parking utilization and revenue. …”
Get full text
Get full text
Get full text
Article -
18
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
20
Development and integration of capacitive sensing and electrocuting grid for mosquitoes surveillance and control
Published 2020“…The final proposed system is tested with a basic species recognition algorithm and achieved species recognition rate of between 75% to 83% and selective trapping rate of between 63% to 69%.…”
Get full text
Get full text
Get full text
Thesis
