Search Results - (( _ application service algorithm ) OR ( iot application ((use algorithm) OR (based algorithm)) ))
Search alternatives:
- application service »
- service algorithm »
- iot application »
- use algorithm »
-
1
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…This was achieved through data transfer using Amazon Web Service (AWS-IoT) cloud connection. …”
Get full text
Get full text
Thesis -
2
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
Get full text
Get full text
Get full text
Article -
4
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023“…Cost effectiveness; Mobile telecommunication systems; Modems; Quality of service; Wireless networks; Cellular network; Computing devices; Internet of thing application; Internet of thing networking; Network connectivity; Network selection; Network selection algorithm; Prototype modem; Selection algorithm; Single-networks; Internet of things…”
Conference Paper -
5
A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry
Published 2021“…Furthermore, an offline authentication phase uses the OTP algorithm to authenticate registered users even if the connectivity services are unavailable. …”
Get full text
Get full text
Article -
6
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…The sharing of confidential personal data such as medical data continues to take place regularly across the globe; it is therefore crucial to protect data from unauthorized access by adversaries. One of the algorithms that is commonly used due to its exemplary security and use in extensive applications is the advanced encryption standard (AES) algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…The application of the Internet of Things (IoT) is increasing to almost all aspects of human endevour. …”
Get full text
Get full text
Thesis -
8
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…Many enterprise companies migrate their services and applications to the cloud to benefit from cloud computing advantages. …”
Get full text
Get full text
Article -
9
Fog-cloud scheduling simulator for reinforcement learning algorithms
Published 2023“…Therefore, supplying optimized scheduling algorithms to provide satisfactory quality service for the node’s task execution and processing becomes demanding. …”
Get full text
Get full text
Article -
10
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…Internet provides almost unlimited connection nowadays and it is widely used in our daily life such as in industrial, IoT and consumer applications. …”
Get full text
Get full text
Thesis -
11
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
12
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
13
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
14
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
15
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…This paper will help readers and researchers understand the IoT and its applicability to the real world.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
16
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
17
An Improved Indoor Positioning Algorithm Based on RSSI-Trilateration Technique for Internet of Things (IOT)
Published 2023Conference Paper -
18
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
19
-
20
Faulty sensor detection mechanism using multi-variate sensors in IoT
Published 2019“…The first proposed method is a logical mechanism uses three different types of. The second method proposed is based on a correlation method that can exploit the multi-variable sensor which existing in IoT application. …”
Get full text
Get full text
Get full text
Get full text
Thesis
