Search Results - (( evolution optimization interface algorithm ) OR ( java application matching algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1
  2. 2

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    An improved hybrid method combined with a cloud-based supervisory control to facilitate smooth coordination under low-inertia grids by Yiizzan, Suffian, Ahmed Mohamed, Ahmed Haidar, Wan Azlan, Wan Zainal Abidin, Hazrul, Mohamed Basri

    Published 2025
    “…The framework has been validated on interconnected Simulink models running in a real-time cloud platform with data collected from local systems, interfaced in a closed-loop test environment. The proposed algorithm demonstrates outstanding performance in maintaining system stability under various operating conditions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9