Search Results - (( iot applications clustering algorithm ) OR ( web application status algorithm ))*

Refine Results
  1. 1
  2. 2

    Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks by Al Ahmed, Mahmoud Tayseer, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Abdullah, Azizol

    Published 2023
    “…Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. …”
    Get full text
    Get full text
    Article
  3. 3

    Blockchain based security framework for device authentication and data communication in decentralized IoT network by Alahmed, Mahmoud Tayseer

    Published 2023
    “…In light of the aforementioned issues, this thesis presents a lightweight, scalable, and secure authentication framework for IoT networks based on blockchain technology. First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions by Almazrouei O.S.M.B.H., Magalingam P., Hasan M.K., Shanmugam M.

    Published 2024
    “…In this review, core modeling techniques for IoT vulnerability assessment are highlighted, such as Markov Decision Processes (MDP), Feature Pyramid Networks (FPN), K-means clustering, and logistic regression models, along with other techniques involving genetic algorithms like fast-forward (FF), contingent fast-forwards (CFF), advanced reinforcement-learning algorithms, and HARMs models. …”
    Review
  5. 5

    Improved K-means clustering and adaptive distance threshold for energy reduction in WSN-IoTs by Azamuddin, Ab Rahman, Hamim, Sakib Iqram

    Published 2025
    “…This study introduces an enhanced energy aware clustering approach that combines an improved K-Means algorithm with an adaptive distance threshold to optimize relay node selection and cluster formation. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…The AGMB algorithm is built upon three algorithms: 1) Grid-Multi-Buffer Stream Clustering (GMBSC), 2) Cautious Grid-Multi-Buffer Stream Clustering (C-GMBSC) and 3) Adaptive-Grid-Multi-Buffer Stream Clustering (A-GMBSC). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Analysis of Chinese patents associated with incremental clustering algorithms: A review / Archana Chaudhari by Chaudhari, Archana, Mulay, Preeti, Kumar Tiwari, Amit

    Published 2022
    “…To achieve learning from such dynamic data sources, incremental clustering algorithms are used mandatorily. This mandate has given rise to increased patents related to incremental clustering concept, which is primarily a significant part of Machine Learning field. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Lightweight ontology architecture for QoS aware service discovery and semantic CoAP data management in heterogeneous IoT environment by Sukhavasi, Suman, Perumal, Thinagaran, Mustapha, Norwati, Yaakob, Razali

    Published 2026
    “…The architecture employs Modified-Ordered Points to Identify the Clustering Structure (M-OPTICS) to cluster and eliminate redundant IoT data. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli by Ramli, Muhammad Hafiz

    Published 2020
    “…HTTP-response status techniques are used in the load balancing to ensure the web page is accessible across multiple web server. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.] by Kushan, Albin Lemuel, Anuar, Muhammad Hazwan, Mohd Supir, Mohd Hafifi, Ahmad Fadzil, Ahmad Firdaus, Zolkeplay, Anwar Farhan

    Published 2021
    “…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
    Get full text
    Get full text
    Book Section
  14. 14
  15. 15

    Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN by Ibrahim, Nurul Saliha Amani

    Published 2022
    “…Due to finite resource, multiple issues need to be considered in designing such system, including AG flight time, coverage radius and the achievable data rate of the ground-to-air system, thus an Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. EECPP consist of two algorithms which is Stop Point Prediction Algorithm using K-Means, which finding the stop point for the AG after grouping the IDs into clusters, and Path Planning Algorithm using Particle Swarm Optimization which connect all of the stop point in shortest route. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…Previous studies have not yet designed such a system that is reliable enough for such critical applications. This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20