Search Results - (( iot application clustering algorithm ) OR ( based application need algorithm ))*
Search alternatives:
- application clustering »
- based application »
- application need »
- iot application »
- need algorithm »
-
1
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…In light of the aforementioned issues, this thesis presents a lightweight, scalable, and secure authentication framework for IoT networks based on blockchain technology. First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
Get full text
Get full text
Thesis -
2
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. …”
Get full text
Get full text
Article -
3
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
Get full text
Get full text
Get full text
Article -
4
Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN
Published 2022“…EECPP consist of two algorithms which is Stop Point Prediction Algorithm using K-Means, which finding the stop point for the AG after grouping the IDs into clusters, and Path Planning Algorithm using Particle Swarm Optimization which connect all of the stop point in shortest route. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…But in dense IoT applications, much more than two tags can constitute a collision slot. …”
Get full text
Get full text
Article -
6
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…In this review, core modeling techniques for IoT vulnerability assessment are highlighted, such as Markov Decision Processes (MDP), Feature Pyramid Networks (FPN), K-means clustering, and logistic regression models, along with other techniques involving genetic algorithms like fast-forward (FF), contingent fast-forwards (CFF), advanced reinforcement-learning algorithms, and HARMs models. …”
Review -
7
Improved K-means clustering and adaptive distance threshold for energy reduction in WSN-IoTs
Published 2025“…This study introduces an enhanced energy aware clustering approach that combines an improved K-Means algorithm with an adaptive distance threshold to optimize relay node selection and cluster formation. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…The AGMB algorithm is built upon three algorithms: 1) Grid-Multi-Buffer Stream Clustering (GMBSC), 2) Cautious Grid-Multi-Buffer Stream Clustering (C-GMBSC) and 3) Adaptive-Grid-Multi-Buffer Stream Clustering (A-GMBSC). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Analysis of Chinese patents associated with incremental clustering algorithms: A review / Archana Chaudhari
Published 2022“…To achieve learning from such dynamic data sources, incremental clustering algorithms are used mandatorily. This mandate has given rise to increased patents related to incremental clustering concept, which is primarily a significant part of Machine Learning field. …”
Get full text
Get full text
Get full text
Article -
11
Lightweight ontology architecture for QoS aware service discovery and semantic CoAP data management in heterogeneous IoT environment
Published 2026“…The architecture employs Modified-Ordered Points to Identify the Clustering Structure (M-OPTICS) to cluster and eliminate redundant IoT data. …”
Get full text
Get full text
Get full text
Article -
12
Improving Network Consistency and Data Availability Using Fuzzy C Mean Clustering Algorithm in Wireless Sensor Networks
Published 2024thesis::doctoral thesis -
13
A comprehensive survey of deep reinforcement learning in UAV-assisted IoT data collection
Published 2025“…Unmanned Aerial Vehicles (UAVs) play a critical role in data collection for a wide range of Internet of Things (IoT) applications across remote, urban, and marine environments. …”
Get full text
Get full text
Article -
14
-
15
-
16
Healthy Lifestyle Management System
Published 2011“…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
Get full text
Get full text
Final Year Project -
17
A simulation based fly optimisation algorithm for swarms of mini autonomous surface vehicles application
Published 2011“…The optimal simulation parameters can be used for the real application. FOA is suitable for applications that need a small number of agents; in the range of 8 to 24 only. …”
Get full text
Get full text
Get full text
Article -
18
Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm
Published 2018Get full text
Get full text
Monograph -
19
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023“…This work is focused on the implementation of evolutionary based computer algorithms, genetic algorithms (GAs), on microcontrollers. …”
Conference paper -
20
