Search Results - (( developing optimization based algorithm ) OR ( based applications security algorithm ))
Search alternatives:
- developing optimization »
- based applications »
-
1
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…For wireless sensor network (WSN) integrated dynamic IoT networks, this paper presents a trust-aware secure Ant colony optimization (ACO)-based routing algorithm to provide security while searching for an energy-efficient optimal routing path. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…In this paper, a secure bio-inspired WSN (Wireless Sensor Network) routing protocol based on ant colony optimization (ACO) algorithm for IoT has been proposed and analyzed to find secure and optimal path that is energy-efficient as well as aiming at providing trust in IoT environment. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
5
New approach of cryptography algorithm for e- mail applications
Published 2005“…The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Conference or Workshop Item -
6
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…In this paper, focus is given on enhanced security scheme in terms of RO based Test-bed evaluation experiment. An enhanced security algorithm is developed on top of MIPv6 RO to secure data. …”
Get full text
Get full text
Conference or Workshop Item -
7
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…The solution set (i.e. optimized weight/bias matrix of ANN) provided by the optimized and improved genetic algorithm and modified BP based model is extracted and used in the design and development of a prototype device of the proposed model. …”
Get full text
Get full text
Thesis -
8
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…In this paper, focus is given on enhanced security scheme in terms of RO based Test-bed evaluation experiment. An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare a safe communication between MN and CN. …”
Get full text
Get full text
Get full text
Article -
9
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…Compared to the Ant Colony Optimization-Genetic Algorithm (ACO-GA) and Ant Colony Optimization- Hierarchical Clustering Mechanism (ACOHCM), the ACO algorithm shows superior power savings and efficiency. …”
Get full text
Get full text
Get full text
Thesis -
10
Deep Learning Based Face Attributes Recognition
Published 2018“…Combined-algorithm based optimizers plays an important role in optimizing the training algorithm. …”
Get full text
Get full text
Monograph -
11
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
Article -
12
Honey bee based trust management system for cloud computing
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
13
The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims
Published 2016“…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app.The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre.The proposed decision aid model and the adaptive system can be applied in supporting the National Security Council’s respond mechanisms for handling disaster management level II (State level) especially in providing better management of the flood evacuating centres.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm
Published 2015“…Developing an exploration algorithm based on spanning tree is the main contribution. …”
Get full text
Get full text
Thesis -
15
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
16
Computational intelligence based power system security assessment and improvement under multicontigencies conditions
Published 2012“…The minimizations of SVSJ and transmission loss are used as two separate objective functions for the development of optimization technique.The effect of reactive power load variation.on transmission loss in the system is also investigated.Consequently,the EP optimization technique is extended for the evaluation of the operating generator scheduling (OGS) to be applied on reactive power control in power system.The results obtained from the study can be used by the power system operators to make a decision either to achieve minimal SVSJ, minimal transmission loss or minimal installation cost.This has also avoided all generators to dispatch power at the same time.Finally,a novel multi-objective Constrained Reactive Power Control (CRPC) algorithm using the state-of-the-art of EP for voltage stability improvement has been developed.A performance comparison with Artificial Immune System (AIS) in terms of SVSJ and loss minimization was made and it is found that the proposed algorithm has been able to produce better results as compared to AIS.The contributions of the studies among the others are the development EP and AIS engine for CPP considered multi-contingencies (N-ni),the development of EP and AIS engine for FACTS installation considered multi-contingencies(N-m) for the determination of FACTS placement using SVSI and optimal sizing of FACTS using EP and AIS, the development of new technique for OGS based on EP optimization technique and the development of multi-objective EP and AIS engines for CRPC considered multi-contingencies (N-m).…”
Get full text
Get full text
Thesis -
17
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…The proposed model is developed and simulated on Matlab based on an improved fuzzy vault scheme with a lightweight error correction algorithm to reduce the computational complexity when compared to previous work. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Secure lightweight client for cloud-based E-Health Model
Published 2023“…The results of this study will remarkably facilitate the development of a practical secure cloud-based eHealth system.…”
Get full text
Get full text
Get full text
Thesis -
19
Computational intelligence based power system security assessment and improvement under multi-contingencies conditions / Nor Rul Hasma Abdullah
Published 2012“…The contributions of the studies among the others are the development EP and AIS engine for CPP considered multi-contingencies (N-m), the development of EP and AIS engine for FACTS installation considered multi-contingencies (N-m) for the determination of FACTS placement using SVSI and optimal sizing of FACTS using EP and AIS, the development of new technique for OGS based on EP optimization technique and the development of multi-objective EP and AIS engines for CRPC considered multi-contingencies (N-m)…”
Get full text
Get full text
Thesis -
20
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
Get full text
Get full text
Thesis
