Search Results - (( based applications using algorithm ) OR ( iot applications matching algorithm ))
Search alternatives:
- applications matching »
- based applications »
- applications using »
- iot applications »
- using algorithm »
-
1
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…But in dense IoT applications, much more than two tags can constitute a collision slot. …”
Get full text
Get full text
Article -
2
Lightweight ontology architecture for QoS aware service discovery and semantic CoAP data management in heterogeneous IoT environment
Published 2026“…User requests, transmitted via the Constrained Application Protocol (CoAP), are semantically enriched and matched to QoS parameters using Dynamic Shannon Entropy optimized with the Salp Swarm Algorithm. …”
Get full text
Get full text
Get full text
Article -
3
IoT Technology Enabled Heuristic Model with Morlet wavelet neural network for numerical treatment of Heterogeneous Mosquito Release Ecosystem
Published 2021“…An artificial neural network with the layer structure of Morlet wavelet (MWNN) kernel is presented using the global and local search optimization schemes of genetic algorithm (GA) and active-set algorithm (ASA), i.e., MWNN-GA-ASA. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
5
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
6
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
7
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
8
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
9
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
10
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2022“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
11
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
12
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
13
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
14
Designing an integrated AIOT system for tracking class attendance
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Based on the theoretical and fundamental research analysis the FUHS16 and UHDS16 algorithms using 16 × 16 block-based motion estimation formulations were developed. …”
Get full text
Get full text
Get full text
Book Chapter -
16
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
18
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…The purpose of this project is to implement FPGA Base Encryption Chip using DES algorithm. Throughout the project, the suitability of the implementation DES algorithm in FPGA will be investigated. …”
Get full text
Get full text
Monograph -
19
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
20
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis
