Search Results - (( _ application using algorithm ) OR ( things applications based algorithm ))
Search alternatives:
- things applications »
- applications based »
- using algorithm »
-
1
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…Variants of the proposed kg-DFSA, traditional DFSA and another grouping based DFSA algorithm (FCM-DFSA) were implemented in MATLAB. …”
Get full text
Get full text
Article -
2
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
3
-
4
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
5
Real-time time series error-based data reduction for internet-of-things applications
Published 2018“…This work differs from existing PIP in the sense that, we have devised a real-time data reduction algorithm namely error-based PIP Data Reduction (PIPE), that operates with a single value configuration; error rate, which can be used with various sensor data without any priori analysis required. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The applications of the Internet of Things in different areas and the resources that demand these applications are on the increase. …”
Get full text
Get full text
Article -
7
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
8
-
9
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
12
-
13
A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…For each algorithm, prior works have been identified, examined, and described based on their conceptual similarities. …”
Get full text
Get full text
Get full text
Article -
15
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…As for the running method the compilation of the code will be run by using cmd and Ant Apache and the total average result of 30 simulation will be view on the web base application will be run using xampp.…”
Get full text
Get full text
Get full text
Academic Exercise -
16
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…New tools based both on clever applications of established algorithms and on new methodologies, empower us to do entirely new things. …”
Get full text
Get full text
Final Year Project -
17
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications
Published 2025“…Hardware prototypes using Raspberry Pi and Industrial Internet of Things components were interfaced with SCADA systems to validate real-world applicability. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…The sharing of confidential personal data such as medical data continues to take place regularly across the globe; it is therefore crucial to protect data from unauthorized access by adversaries. One of the algorithms that is commonly used due to its exemplary security and use in extensive applications is the advanced encryption standard (AES) algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Diagnosis of breast cancer using case-based reasoning
Published 2012“…The application used the 100 data of Wisconsin Breast Cancer dataset for evaluating the CBR algorithm. …”
Get full text
Get full text
Undergraduates Project Papers
