Search Results - (( its application cloud algorithm ) OR ( iot applications ((tree algorithm) OR (_ algorithm)) ))*
Search alternatives:
- application cloud »
- iot applications »
- its application »
- cloud algorithm »
- tree algorithm »
-
1
IOT-based fertigation system / Mohamad Amir Furqan Darus
Published 2024“…The Fertigation, the precise application of water and fertilizers in agriculture, has evolved with the integration of Internet of Things (IoT) technology. …”
Get full text
Get full text
Student Project -
2
-
3
Fog-cloud scheduling simulator for reinforcement learning algorithms
Published 2023“…Fog computing is a popular choice for Internet of Things (IoT) applications, such as electricity, health, transportation, smart cities, security, and more. …”
Get full text
Get full text
Article -
4
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
5
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…These implementations possibly makes the UGV more authentic and widen its application in mission-based operation or even in simple commercial operation.…”
Get full text
Get full text
Monograph -
6
Internet of things security vulnerabilities and recommended solutions
Published 2018“…The application framework of IoT comprises of devices that are highly heterogeneous and compute migrations from sensor to IoT gateways to edge/fog computing to the cloud and then back to the client along with various alarming components. …”
Get full text
Get full text
Get full text
Article -
7
Design and implementation of solar-powered with IoT-Enabled portable irrigation system
Published 2022“…The proposed irrigation system updates the gathered information from sensors (moisture, temperature, and humidity) using an integrated algorithm to the Blynk IoT cloud in real-time. Farmers can access this information and control the water pump accordingly via a user-friendly interface using their smartphones. …”
Get full text
Get full text
Get full text
Article -
8
Intersection Features For Android Botnet Classification
Published 2019“…Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
Get full text
Get full text
Get full text
Article -
9
Performance analysis of constrained device virtualization algorithm
Published 2020“…This paper proposes the operations of the Constrained Device Virtualization Algorithm and then simulates it in CloudSIM to derive performance results. …”
Get full text
Get full text
Get full text
Article -
10
Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions
Published 2022“…WSNs are a good demonstration of an ambient intelligence vision, in which the environment becomes intelligent and aware of its surroundings. WSN has unique features which create its own distinct network attributes and is deployed widely for critical real-time applications that require stringent prerequisites when dealing with faults to ensure the avoidance and tolerance management of catastrophic outcomes. …”
Get full text
Get full text
Article -
11
Evaluation of cloud 3D printing services oriented toward the product life cycle based on a triangular fuzzy number complementary judgment matrix
Published 2024“…This methodological innovation underscores its practical feasibility and effectiveness in real-world applications. …”
Get full text
Get full text
Get full text
Article -
12
-
13
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system
Published 2022“…The AllThingsTalkMaker IoT server is integrated into the TTN to be accessed using Web/mobile application interfaces. …”
Get full text
Get full text
Get full text
Article -
15
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…Cyber security has recently garnered enormous attention due to the popularity of the Internet of Things (IoT), intelligent devices rapid growth, and a vast number of real-life applications. …”
Get full text
Get full text
Article -
16
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
17
A Penalty-Based Genetic Algorithm For The Composite Saas Placement Problem In The Cloud
Published 2010“…Cloud computing is a latest new computing paradigm where applications, data and IT services, are provided over the Internet. …”
Get full text
Get full text
Conference or Workshop Item -
18
Two objectives big data task scheduling using swarm intelligence in cloud computing
Published 2016“…Although many scheduling algorithms have been implemented for cloud computing, it has been realized that most of the applications nowadays require different objectives that simple scheduling algorithms fail to achieve. …”
Get full text
Get full text
Get full text
Article -
19
Impatient job scheduling under cloud computing
Published 2012“…The first part focuses on review- ing the previous immediate mode scheduling and adopting them on cloud paradigm. The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
Get full text
Get full text
Thesis -
20
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…Genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise
