Search Results - (( _ application using algorithm ) OR ( things applications based algorithm ))

Refine Results
  1. 1

    Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering by Umelo, Nnamdi Henry, Noordin, Nor Kamariah, A. Rasid, Mohd Fadlee, Tan, Kim Geok, Hashim, Fazirulhisyam

    Published 2023
    “…Variants of the proposed kg-DFSA, traditional DFSA and another grouping based DFSA algorithm (FCM-DFSA) were implemented in MATLAB. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Real-time time series error-based data reduction for internet-of-things applications by Wong, Siaw Ling

    Published 2018
    “…This work differs from existing PIP in the sense that, we have devised a real-time data reduction algorithm namely error-based PIP Data Reduction (PIPE), that operates with a single value configuration; error rate, which can be used with various sensor data without any priori analysis required. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system by Balla, Asaad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Mubarak, Sinil

    Published 2022
    “…For each algorithm, prior works have been identified, examined, and described based on their conceptual similarities. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES) by Kamal Khairi Supaprhman

    Published 2022
    “…As for the running method the compilation of the code will be run by using cmd and Ant Apache and the total average result of 30 simulation will be view on the web base application will be run using xampp.…”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16

    DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH by LUONG, TRUNG TUAN

    Published 2005
    “…New tools based both on clever applications of established algorithms and on new methodologies, empower us to do entirely new things. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications by Far Chen, Jong

    Published 2025
    “…Hardware prototypes using Raspberry Pi and Industrial Internet of Things components were interfaced with SCADA systems to validate real-world applicability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Security analysis of data transmission in an IoT based platform for telemedicine by Olanrewaju, Rashidah Funke, Amuda, Idowu Rahaman, Hassan Abdalla Hashim, Aisha

    Published 2021
    “…The sharing of confidential personal data such as medical data continues to take place regularly across the globe; it is therefore crucial to protect data from unauthorized access by adversaries. One of the algorithms that is commonly used due to its exemplary security and use in extensive applications is the advanced encryption standard (AES) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Diagnosis of breast cancer using case-based reasoning by Nurramlah, Abu Nasir

    Published 2012
    “…The application used the 100 data of Wisconsin Breast Cancer dataset for evaluating the CBR algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers