Search Results - (( iot applications modified algorithm ) OR ( _ application testing algorithm ))

Refine Results
  1. 1
  2. 2

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…The vulnerabilities in BLE 4.2 and 5.x add an attractive perspective to the security of IoT technology. The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Lightweight ontology architecture for QoS aware service discovery and semantic CoAP data management in heterogeneous IoT environment by Sukhavasi, Suman, Perumal, Thinagaran, Mustapha, Norwati, Yaakob, Razali

    Published 2026
    “…The architecture employs Modified-Ordered Points to Identify the Clustering Structure (M-OPTICS) to cluster and eliminate redundant IoT data. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A dynamic replication aware load balanced scheduling for data grids in distributed environments of internet of things by Bakhshad, Said, Noor, Rafidah Md, Akhundzada, Adnan, Saba, Tanzila, Ahmedy, Ismail, Haroon, Faisal, Nazir, Babar

    Published 2018
    “…The simulation of the proposed algorithm shows promising results and better performance compared to the current state-of-the-art Modified Dynamic Hierarchical Replication (MDHR) algorithm. …”
    Get full text
    Get full text
    Article
  5. 5

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate by Abdulraheem, Waleed Khalid Amin

    Published 2019
    “…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  11. 11
  12. 12
  13. 13

    An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion by Haque, Ariful

    Published 2018
    “…The elaborated result of the study will help test engineers to choose the algorithm they need to generate test cases efficiently and optimally.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Hybrid flower pollination algorithm strategies for t-way test suite generation by Abdullah, Nasser, Kamal Z., Zamli, Alsewari, Abdulrahman A., Ahmed, Bestoun S.

    Published 2018
    “…The application of meta-heuristic algorithms for t-way testing has recently become prevalent. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    Test suite generation based on hybrid flower pollination algorithm and hill climbing by Nasser, Abdullah B., Nor Wardah, Mohd Nasir, Kamal Zuhairi, Zamli, Waheeda Ali, H. M. Ghanem, Fakhrud, Din

    Published 2021
    “…The application of meta-heuristic algorithms in t-way tests generation, as an example of SBST, has as of late gotten to be predominant. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Comparative analysis of sine cosine and social network search-based algorithm for software test redundancy reduction optimization by Mekeng, Ambros Magnus Rudolf, Kamal Z., Zamli, Muhammad Zarlis, .

    Published 2024
    “…More precisely, our work intents to investigate the algorithms' performance in terms of test reduction percentage and execution time. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20