Search Results - (( java application optimized algorithm ) OR ( iot implementation model algorithm ))
Search alternatives:
- implementation model »
- optimized algorithm »
- iot implementation »
- java application »
- model algorithm »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
2
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…The attribute reduction technique is implemented with Matlab. The EECPD and GAEIWPSO algorithms are implemented with Python and Networkx simulators while DTOA algorithm is implemented with iFogSim to demonstrate the efficiency of the proposed scheme. …”
Get full text
Get full text
Thesis -
3
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. CP-ABE algorithm is one-to-many technique suitable for secure grouping communication, but this algorithm is not a lightweight feature. …”
Get full text
Get full text
Get full text
Article -
4
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…Various machine learning algorithms were also implemented upon the processed data for comparative analysis. …”
Get full text
Get full text
Article -
5
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…IoT is considered a widely recognized implementation that includes intelligent health care, intelligent transport, and intelligent grids. …”
Get full text
Get full text
Article -
8
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
9
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
10
Enhancing indoor positioning service for location based internet of things (IoT): a source selecting approach with error compensation
Published 2017Get full text
Get full text
Conference or Workshop Item -
11
Analysis of Rabin-p and HIME(R) encryption scheme on IoT platform
Published 2020“…The algorithm of Rabin-p tested by utilizing the C-programming and implemented on a microprocessor system namely Raspberry Pi 3 model B. …”
Get full text
Get full text
Get full text
Article -
12
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
13
Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT)
Published 2021“…As the chosen model to be implemented in this analysis, the Q-learning algorithm proposal offers a possible solution for addressing evolving IoT environments and configurations. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…In this work, we focus our review on activity recognition implementation strategies by examining various sensors and sensing technologies used to collect useful data from IoT devices, reviewing preprocessing and feature extraction techniques, as well as classification algorithms used to recognize human activities in smart homes. …”
Get full text
Get full text
Article -
16
ESS-IoT: The Smart Waste Management System for General Household
Published 2024“…On the other hand, the waste classification is implemented using two classification algorithms: Random Forest (RF) prediction model and Convolutional Neural Network (CNN) prediction model. …”
Article -
17
Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications
Published 2025“…However, the mobility of IoT devices introduces challenges in optimizing energy efficiency. …”
Get full text
Get full text
Get full text
Article -
18
Trust-aware authentication and authorization for IoT: a federated machine learning approach
Published 2024“…The proposed solution for AA IoT utilizes a trust calculation algorithm based on Federated Learning (FL), which is suitable for IoT environments and enables data privacy and scalability. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
20
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article
