Search Results - (( web application bees algorithm ) OR ( iot applications modified algorithm ))
Search alternatives:
- applications modified »
- application bees »
- iot applications »
- web application »
- bees algorithm »
-
1
Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
2
-
3
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The vulnerabilities in BLE 4.2 and 5.x add an attractive perspective to the security of IoT technology. The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
Get full text
Get full text
Thesis -
4
-
5
Lightweight ontology architecture for QoS aware service discovery and semantic CoAP data management in heterogeneous IoT environment
Published 2026“…The architecture employs Modified-Ordered Points to Identify the Clustering Structure (M-OPTICS) to cluster and eliminate redundant IoT data. …”
Get full text
Get full text
Get full text
Article -
6
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. The result of the algorithm performance will be appeared in web application system. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
A dynamic replication aware load balanced scheduling for data grids in distributed environments of internet of things
Published 2018“…The simulation of the proposed algorithm shows promising results and better performance compared to the current state-of-the-art Modified Dynamic Hierarchical Replication (MDHR) algorithm. …”
Get full text
Get full text
Article -
8
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
9
Intelligent Optimization Techniques for Optimal Power Flow using Interline Power Flow Controller
Published 2010Get full text
Get full text
Conference or Workshop Item -
10
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. …”
Get full text
Get full text
Thesis
