Search Results - (( iot implementation modified algorithm ) OR ( java evolution optimization algorithm ))

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…The aim of this evolution is to reflect the unseen time overhead incurred by optimal real-time algorithm, represented by LRE-TL, which might hinder the claimed optimality of such algorithms when they are practically implemented. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…The vulnerabilities in BLE 4.2 and 5.x add an attractive perspective to the security of IoT technology. The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The development and implementation of the proposed technique was involved the process of modifying the standard GA so that it is good and specific enough to tackle this network intrusion problem effectively. …”
    Get full text
    Get full text
    Thesis