Search Results - (( iot application based algorithm ) OR ( _ application model algorithm ))*
Search alternatives:
- application based »
- application model »
- iot application »
- model algorithm »
-
1
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…Finally, a Dynamic Task Offloading Algorithm (DTOA) based on rank accuracy estimation model to efficiently schedule tasks and resources in the Mobile-Fog-Cloud system is proposed. …”
Get full text
Get full text
Thesis -
4
-
5
An efficient real-time data collection model for multivariate sensors in internet of things (IOT) applications
Published 2019“…Finally, an efficient real-time data collection model for multivariate sensors in IoT applications (RDCM). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
7
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…But in dense IoT applications, much more than two tags can constitute a collision slot. …”
Get full text
Get full text
Article -
8
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…For each algorithm, prior works have been identified, examined, and described based on their conceptual similarities. …”
Get full text
Get full text
Get full text
Article -
9
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. …”
Get full text
Get full text
Article -
10
-
11
Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT)
Published 2021“…Q-learning is one of the successful techniques available for the exploration of IoT nodes, but context based problems have already been established and simplified as issues of dedicated server management, IoT object data acquisition issues, and unique application requirements. …”
Get full text
Get full text
Conference or Workshop Item -
12
Smart agriculture: precision farming through sensor-based crop monitoring and control system
Published 2024“…Subsequently, four distinct algorithms are trained with the collected dataset to ascertain the most optimal algorithm for predicting crop growth and harvesting time, resulting in the selection of the Random Forest Regression model, which attains the highest model score of 86%. …”
Get full text
Get full text
Get full text
Article -
13
-
14
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
15
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…Here, the novelty of the work is the application of MVO algorithm in fine-turning the hyperparameters involved in BiGRU model. …”
Get full text
Get full text
Get full text
Article -
16
IoT Technology Enabled Heuristic Model with Morlet wavelet neural network for numerical treatment of Heterogeneous Mosquito Release Ecosystem
Published 2021“…The utmost advancements of artificial neural networks (ANNs), software-defined networks (SDNs) and internet of things (IoT) technologies find beneficial in different applications of the smart healthcare sector. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications
Published 2025“…Abstract: The proliferation of Internet of Things (IoT) applications has significantly increased the demand for communication protocols that are both resilient and energy-efficient. …”
Get full text
Get full text
Get full text
Article -
18
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
19
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…This may be useful for real-world applications such as surveillance systems based on IoT and customer behaviour analytics systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
An Improved Indoor Positioning Algorithm Based on RSSI-Trilateration Technique for Internet of Things (IOT)
Published 2023Conference Paper
