Search Results - (( using iot detection algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
-
1
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
Get full text
Get full text
Article -
2
-
3
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…This paper represents a model that accounts for the detection of botnets through the use of machine learning algorithms. …”
Get full text
Get full text
Article -
4
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
Published 2020“…The experiment indicates that deep learning algorithms are suitable for intrusion detection in IoT network environment…”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Home intruder detection system using machine learning and IoT
Published 2022“…HIDES implements an object detection algorithm; Single-Shot Multibox Detection (SSD) in NVIDIA Jetson Nano to detect intruders through a camera connected to the system. …”
Get full text
Get full text
Get full text
Article -
7
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…The performance tests are also conducted to assess whether each algorithm can detect most of the true anomalies. The data is supplied using IoT devices, and benchmark datasets are also presented to test the algorithm's performance.…”
Get full text
Get full text
Thesis -
8
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
9
A study on obstacle detection for IoT based automated guided vehicle (AGV)
Published 2022“…An AGV prototype is designed for obstacle detection and the performance is analyzed. In order to improve obstacle detection in the AGV prototype, Kalman Filtering (KF) algorithm is used in the signal filtering for the HC-SR04 Ultrasonic Sensor data acquisition. …”
Get full text
Get full text
Get full text
Article -
10
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
12
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
13
Two-factor authentication smart entryway using modified LBPH algorithm
Published 2024“…Many face detection models have been developed in smart entryways using IoT. …”
Get full text
Get full text
Get full text
Article -
14
Hybrid ensemble learning techniques for intrusion detection systems in Internet of Things security
Published 2025“…The second technique also utilised XGBoost and LightGBM but focused on a multi-class classification problem using the TON IoT dataset. The final technique aimed to enhance the accuracy achieved in the second technique by addressing imbalanced classes in multi-class intrusion detection for IoT using XGBoost, LightGBM, and the ADASYNMLP approach. …”
Get full text
Get full text
UMK Etheses -
15
Faulty sensor detection mechanism using multi-variate sensors in IoT
Published 2019“…The first proposed method is a logical mechanism uses three different types of. The second method proposed is based on a correlation method that can exploit the multi-variable sensor which existing in IoT application. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Internet of Things (IoT) intrusion detection by Machine Learning (ML): a review
Published 2023“…For example, it could be used to keep an eye on and regulate industrial services, or it could be used to improve corporate operations. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Fire alarm system with real-time monitoring and alert system using IOT / Muhammad Habib Shaharuddin
Published 2024“…These sensors collect data continually and use wireless networks to send it to a central IoT hub. …”
Get full text
Get full text
Student Project -
19
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
20
IoT – eye drowsiness detection system by using Intel Edison with GPS navigation
Published 2018“…Technology in digital computer system allows us to create a drowsiness detection sys-tem. Studies for drowsiness detector system has focused on development of computer vision algorithm and lack of Internet of Things (IoT) and notification system, either awake or sleep or might involve in accident, and current location. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
