Search Results - (( intelligence based non algorithm ) OR ( intelligence based protocol algorithm ))*
Search alternatives:
- intelligence based »
- protocol algorithm »
- non algorithm »
-
1
-
2
-
3
Genetic Algorithm based Chain Leader Election in Wireless Sensor Network for Precision Farming
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. …”
Get full text
Get full text
Thesis -
6
Modeling and simulation of WSNs for agriculture applications using dynamic transmit power control algorithm
Published 2013Get full text
Working Paper -
7
Cauchy Density-based Algorithm for VANETs Clustering in 3D Road Environments
Published 2022“…In addition, a clustering algorithm that defines mobility vector and uses Cauchy-based density for enabling adding vehicles to their respective clusters. …”
Get full text
Get full text
Article -
8
-
9
Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing
Published 2012“…For this purpose, it is proposed to employ an intelligent message routing by implementing Application Oriented Networking (AON) at the routing layer of the systems that are based on DSD architecture. …”
Get full text
Get full text
Thesis -
10
-
11
A smart metering for energy management system via GSM-SMS based protocol
Published 2011“…The proposed monitoring system consist of a new energy calculation algorithm, offering electricity packages with a intelligent monitoring for daily power consumption connected to base-station via GSM network. …”
Get full text
Get full text
Undergraduates Project Papers -
12
-
13
Energy-efficient data transmission with clustering and compressive sensing in wireless sensor networks / Mukil Alagirisamy
Published 2020“…Energy-Aware Unequal Clustering routing algorithm with Dual sink (EAUC-DUAL) and Energy based Cluster Head selection Unequal Clustering with Dual sink (ECH-DUAL) are proposed. …”
Get full text
Get full text
Get full text
Thesis -
14
Energy efficient cluster head distribution in wireless sensor networks
Published 2013“…The main objective of this research is to improve the cluster based wireless sensor networks lifetime by selecting appropriate cluster head (CH) via improved swarm intelligence. …”
Get full text
Get full text
Get full text
Thesis -
15
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
16
Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks
Published 2021“…Finally, CEC-GP shows a better stability performance compared with "Centre-based Stable Clustering (CBSC)" and "Evolving Data Clustering Algorithm (EDCA)" based on different performance metrics such as the clustering efficiency, the cluster head, and cluster member duration, the cluster head change rate, and the number of created clusters. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Cohesive token passing algorithm utilizing software agents
Published 2010“…The core of the new protocol is based on the circulation mechanism of the token. …”
Get full text
Get full text
Article -
18
-
19
-
20
Evaluation of Security Metric for Artificial Internet of Things Smart Locking System
Published 2023“…The primary goal of this dissertation is to evaluate the security metric for IoT based locking system and design an enhance smart locking system that leverages the capabilities of Artificial Intelligence for facial recognition from the ground up. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
