Search Results - (( based application design algorithm ) OR ( iot applications search algorithm ))*
Search alternatives:
- applications search »
- application design »
- based application »
- design algorithm »
- iot applications »
-
1
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
4
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
Get full text
Get full text
Get full text
Article -
5
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
6
IoT Technology Enabled Heuristic Model with Morlet wavelet neural network for numerical treatment of Heterogeneous Mosquito Release Ecosystem
Published 2021“…An artificial neural network with the layer structure of Morlet wavelet (MWNN) kernel is presented using the global and local search optimization schemes of genetic algorithm (GA) and active-set algorithm (ASA), i.e., MWNN-GA-ASA. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The results of this study show that the proposed method which is the combination of Genetic Algorithm, Artificial Immune System (AIS) and local search has produced the desired results. …”
Get full text
Get full text
Thesis -
8
Analysis of Chinese patents associated with incremental clustering algorithms: A review / Archana Chaudhari
Published 2022“…With the advent of Internet-of-Things (IoT) and overall Information-Technology world, an enormous amount of data is getting generated dynamically and in real-time mode, in almost all domains of research and application systems. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Robotics in Education
Published 2026“…The AI section discusses machine learning, path-planning algorithms (e.g., A* search, SLAM), and classroom case studies. …”
Get full text
Get full text
Get full text
Get full text
Book -
11
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
12
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Fast decryption method for a Rabin primitive-based cryptosystem
Published 2014“…Hence faster decryption algorithms are sought-after. In this paper we design a fast and efficient algorithm for the decryption of the new cryptosystem based on the Rabin primitive. …”
Get full text
Get full text
Get full text
Article -
15
Developing triad design algorithms based on compatible factorization
Published 2011Get full text
Get full text
Get full text
Monograph -
16
-
17
-
18
Effectiveness of nature-inspired algorithms using ANFIS for blade design optimization and wind turbine efficiency
Published 2019“…The performance of these three algorithms in obtaining the optimal blade design based on the Cp are investigated and compared. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph
