Search Results - (( using optimization sensor algorithm ) OR ( security classification using algorithm ))
Search alternatives:
- security classification »
- classification using »
- optimization sensor »
- sensor algorithm »
- using algorithm »
-
1
Smart phone sensor data: Comparative analysis of various classification methods for task of human activity recognition
Published 2018“…Human Activity Recognition has a long history of research and requires further exploration to produce useful and optimal outcomes. Areas such as medicine, daily routine, and security are some benefits that smartphone enables via embedded sensors. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
2
Symmetric Key Size for Different Level of Information Classification
Published 2006“…Therefore confidential information is normally protected by using cryptographic algorithms. In these algorithms, key is an important element since it is one of the parameters that determine the level of security that the algorithms can provide. …”
Get full text
Get full text
Conference or Workshop Item -
3
A centralized localization algorithm for prolonging the lifetime of wireless sensor networks using particle swarm optimization in the existence of obstacles
Published 2017“…Particle Swarm Optimization has been used in the proposed algorithm to minimize the fitness function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
-
5
Simulated Kalman Filter optimization algorithm for maximization of wireless sensor networks coverage
Published 2019“…It had been successfully used for optimization of many engineering problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
Get full text
Get full text
Get full text
Thesis -
7
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
Get full text
Get full text
Thesis -
8
Cluster head selection optimization in wireless sensor network via genetic-based evolutionary algorithm
Published 2020“…Genetic-based evolutionary algorithms such as Genetic Algorithm (GA) and Differential Evolution (DE) have been popularly used to optimize cluster head selection in WSN to improve energy efficiency for the extension of network lifetime. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
10
Global optimization method for continuous - Time sensor scheduling
Published 2010“…We consider a situation in which several sensors are used to collect data for signal processing since operating multiple sensors simultaneously canses system interference, only one sensor can be active at any one time.The problem of scheduling a discrete-valued optimal control problem.This problem cannot be solved using conventional optimization problem.The Transformed problem is then decomposed into a bi-level optimization problem, which is solved using a discreate filled function method in conjunction with a conventional optimal control algorithm.Numerical results show that our algorithm is robust, efficient, and reliable in attaining a near globally optimal solution.…”
Get full text
Get full text
Get full text
Article -
11
Provisioning an energy efficient with maximum coverage WSN through biological inspired sensor node placement
Published 2023Conference Paper -
12
Whale optimization algorithm based on tent chaotic map for feature selection in soft sensors
Published 2025“…One of the powerful optimization algorithms that is used for feature selection is the Whale Optimization Algorithm (WOA), which is a nature-inspired metaheuristic optimization algorithm that mimics the social behavior of humpback whales. …”
Get full text
Get full text
Get full text
Article -
13
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…The IDS with machine learning method improves the detection accuracy of the security attacks. To this end, this paper studies the classification analysis of intrusion detection using various supervised learning algorithms such as SVM, Naive Bayes, KNN, Random Forest, Logistic Regression and Decision tree on the NSL-KDD dataset. …”
Get full text
Get full text
Get full text
Article -
14
Optimizing Visual Surveillance Sensor Coverage Using Dynamic Programming
Published 2017“…The main contribution of the paper is to introduce a dynamic programming algorithm, which defines an optimal policy for solving the visual sensor coverage problem. …”
Get full text
Get full text
Article -
15
A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network
Published 2024“…Results: Simulation results perfectly showed that the suggested localization algorithm based on NMM can carry out a better performance than that of other localization algorithms utilizing other op- timization approaches, including a particle swarm optimization, ant colony (ACO) and bat algorithm (BA). …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Multi-objective biological mimicry optimization algorithm for WSN sensor node placement
Published 2023Conference Paper -
17
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
18
A Green Clustering Protocol for Mobile Sensor Network Using Particle Swarm Optimization
Published 2016“…One of the methods that can improve the utilization of sensor nodes batteries is the clustering method. In this paper, we propose a green clustering protocol for mobile sensor networks using particle swarm optimization (PSO) algorithm.…”
Get full text
Article -
19
Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: a review paper
Published 2017“…The review shows that most of the algorithms used one parameter to find the optimal number of mobile agents in multi-agent itinerary planning without utilizing other parameters. …”
Get full text
Get full text
Get full text
Article -
20
Mobile robot path optimization algorithm using vector calculus and mapping of 2 dimensional space
Published 2015“…This research explores path integration in mobile robot navigation and path optimization technique using vector calculus. A simulated robot in a simulated environment is used to test the algorithm that is to be developed. …”
Get full text
Get full text
Get full text
Article
