Search Results - (( developing things selection algorithm ) OR ( java implication bees algorithm ))
Search alternatives:
- selection algorithm »
- developing things »
- things selection »
- java implication »
- implication bees »
- bees algorithm »
-
1
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
2
-
3
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
4
Intersection Features For Android Botnet Classification
Published 2019“…The Chi Square was used to select the most significant permissions, then the classification algorithms like Naïve Bayes and Decision Tree were used to classify the Android apps as botnet or benign apps. …”
Get full text
Get full text
Get full text
Article -
5
-
6
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…Due to the increased usage of the Internet of Things and heterogeneous distributed devices, the development of effective and reliable intrusion detection systems (IDS) has become more critical. …”
Get full text
Get full text
Article -
7
Systematic review of intrusion detection system based on machine learning techniques for internet of things
Published 2023“…The Internet of Things (IoT) has become an integral part of modern society, contributing to the intelligent development of various domains. …”
Get full text
Get full text
Article -
8
Design and development of smart parking system based on fog computing and internet of things
Published 2021“…Moreover, the parking‐spot selection process considers criteria that do not maximize parking utilization and revenue. …”
Get full text
Get full text
Get full text
Article -
9
A Survey on Distributed Topology Control Techniques for Extending the Lifetime of Battery Powered Wireless Sensor Networks
Published 2013“…Large-scale, self-organizing wireless sensor and mesh network deployments are being driven by recent technological developments such as The Internet of Things (IoT), Smart Grids and Smart Environment applications. …”
Get full text
Get full text
Citation Index Journal -
10
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
User recommendation algorithm in social tagging system based on hybrid user trust
Published 2013“…The hybrid User Trust method is able to find the most trusted users and selected as neighbours to generate recommendations. …”
Get full text
Get full text
Get full text
Article -
12
Review and analysis of risk factor of maternal health in remote area using the Internet of Things (IoT)
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
Get full text
Get full text
Get full text
Article -
14
Optimal reactive power dispatch using multistage artificial immune system
Published 2023“…Non-convex, non-linear, and multimodal problems make the development of intelligent algorithms to solve the reactive power dispatch problem highly relevant. …”
Article -
15
Development of wireless data acquisiton system using LoRa technology for construction of PID control system
Published 2025text::Thesis -
16
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
17
Metocean Big Data Processing Using Hadoop
Published 2015“…The literature review part will explain the definition of NoSQL and RDBMS, Hadoop Mapreduce and big data, things to do when selecting database, NoSQL database deployments, scenarios for using Hadoop and Hadoop real world example. …”
Get full text
Get full text
Final Year Project -
18
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
20
Development and integration of capacitive sensing and electrocuting grid for mosquitoes surveillance and control
Published 2020“…The final proposed system is tested with a basic species recognition algorithm and achieved species recognition rate of between 75% to 83% and selective trapping rate of between 63% to 69%.…”
Get full text
Get full text
Get full text
Thesis
