Search Results - (( model evaluation method algorithm ) OR ( data distribution sensor algorithm ))*
Search alternatives:
- distribution sensor »
- evaluation method »
- data distribution »
- model evaluation »
- method algorithm »
- sensor algorithm »
-
1
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…In order to evaluate the scalability at specific data size the appropriate regression models are fitted through the measured data as functions of number of workers. …”
Get full text
Get full text
Thesis -
2
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
Get full text
Get full text
Article -
3
The comparison study among optimization techniques in optimizing a distribution system state estimation
Published 2017“…This thesis introduce an intelligent decentralized State Estimation method based on Firefly algorithm for distribution power systems. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti
Published 2022“…This study extracted pothole area and volume information from fusion of Digital Elevation Model (DEM) and classified MS image. The study set four main objectives to achieve its aim: (1) To analyse RGB and multispectral sensor calibration, (2) To evaluate the optimal flight parameters for pothole modelling production using RGB imagery, (3) To investigate various classifier algorithms and band combinations for pothole region areas using multispectral imagery and (4) To validate geometric information from the extracted pothole. …”
Get full text
Get full text
Thesis -
5
Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities
Published 2021“…This work proposes a new authentication scheme for agriculture professionals based on a multi-gateway communication model using a fuzzy extractor algorithm to support the Society 5.0 environment. …”
Get full text
Get full text
Get full text
Article -
6
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. …”
Get full text
Get full text
Get full text
Article -
7
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. …”
Get full text
Get full text
Get full text
Article -
8
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. …”
Get full text
Get full text
Get full text
Article -
9
Design and development of real-time particulate matter measuring instrument applying laser scattering technique for microenvironment monitoring
Published 2020“…Based on the evaluation, PMSA003 was selected as the best sensor to be applied in this PM monitoring instrument due to its high linearity response with reference instruments with R2>0.9 and low intra-model variability of 17.71%. …”
Get full text
Get full text
Get full text
Thesis -
10
Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution
Published 2014“…The main and definitive target of routing protocols in Wireless Sensor Networks (WSN) is passing data from the sensor nodes to the sink in most energy efficient manner besides considering the accuracy of data. …”
Get full text
Get full text
Thesis -
11
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. …”
Get full text
Get full text
Get full text
Article -
12
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. …”
Get full text
Get full text
Get full text
Article -
13
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. …”
Get full text
Get full text
Get full text
Article -
14
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2022“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. …”
Get full text
Get full text
Get full text
Article -
15
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. …”
Get full text
Get full text
Get full text
Article -
16
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. …”
Get full text
Get full text
Get full text
Article -
17
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. …”
Get full text
Get full text
Get full text
Article -
18
A scheduled activity energy aware distributed clustering algorithm for wireless sensor networks with nonuniform node distribution
Published 2014“…However, due to the nonuniform node distribution, there is a redundancy in sensed and transmitted data in dense area. …”
Get full text
Get full text
Get full text
Article -
19
Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: a review paper
Published 2017“…Recently, wireless sensor networks have employed the concept of mobile agent to reduce energy consumption and obtain effective data gathering. …”
Get full text
Get full text
Get full text
Article -
20
Efficient k-coverage scheduling algorithms for wireless sensor networks / Ahmed Abdullah Saleh Al-Shalabi
Published 2014“…An efficient k-coverage algorithm for sensors with fixed sensing range (Maximum Layers Scheduling algorithm - MLS) is demonstrated. …”
Get full text
Get full text
Thesis
