Search Results - (( development things selection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- selection algorithm »
- development things »
- implication based »
- things selection »
- java implication »
-
1
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
2
-
3
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
4
-
5
Intersection Features For Android Botnet Classification
Published 2019“…The Chi Square was used to select the most significant permissions, then the classification algorithms like Naïve Bayes and Decision Tree were used to classify the Android apps as botnet or benign apps. …”
Get full text
Get full text
Get full text
Article -
6
-
7
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…Due to the increased usage of the Internet of Things and heterogeneous distributed devices, the development of effective and reliable intrusion detection systems (IDS) has become more critical. …”
Get full text
Get full text
Article -
8
Systematic review of intrusion detection system based on machine learning techniques for internet of things
Published 2023“…The Internet of Things (IoT) has become an integral part of modern society, contributing to the intelligent development of various domains. …”
Get full text
Get full text
Article -
9
Design and development of smart parking system based on fog computing and internet of things
Published 2021“…Moreover, the parking‐spot selection process considers criteria that do not maximize parking utilization and revenue. …”
Get full text
Get full text
Get full text
Article -
10
A Survey on Distributed Topology Control Techniques for Extending the Lifetime of Battery Powered Wireless Sensor Networks
Published 2013“…Large-scale, self-organizing wireless sensor and mesh network deployments are being driven by recent technological developments such as The Internet of Things (IoT), Smart Grids and Smart Environment applications. …”
Get full text
Get full text
Citation Index Journal -
11
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
12
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
User recommendation algorithm in social tagging system based on hybrid user trust
Published 2013“…The hybrid User Trust method is able to find the most trusted users and selected as neighbours to generate recommendations. …”
Get full text
Get full text
Get full text
Article -
14
Review and analysis of risk factor of maternal health in remote area using the Internet of Things (IoT)
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
Get full text
Get full text
Get full text
Article -
16
Optimal reactive power dispatch using multistage artificial immune system
Published 2023“…Non-convex, non-linear, and multimodal problems make the development of intelligent algorithms to solve the reactive power dispatch problem highly relevant. …”
Article -
17
Development of wireless data acquisiton system using LoRa technology for construction of PID control system
Published 2025text::Thesis -
18
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
19
Metocean Big Data Processing Using Hadoop
Published 2015“…The literature review part will explain the definition of NoSQL and RDBMS, Hadoop Mapreduce and big data, things to do when selecting database, NoSQL database deployments, scenarios for using Hadoop and Hadoop real world example. …”
Get full text
Get full text
Final Year Project -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
