Search Results - (( web application using algorithm ) OR ( iot application clustering algorithm ))*
Search alternatives:
- application clustering »
- web application »
- using algorithm »
- iot application »
-
1
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…But in dense IoT applications, much more than two tags can constitute a collision slot. …”
Get full text
Get full text
Article -
2
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. …”
Get full text
Get full text
Article -
3
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…In light of the aforementioned issues, this thesis presents a lightweight, scalable, and secure authentication framework for IoT networks based on blockchain technology. First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
Get full text
Get full text
Thesis -
4
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…In this review, core modeling techniques for IoT vulnerability assessment are highlighted, such as Markov Decision Processes (MDP), Feature Pyramid Networks (FPN), K-means clustering, and logistic regression models, along with other techniques involving genetic algorithms like fast-forward (FF), contingent fast-forwards (CFF), advanced reinforcement-learning algorithms, and HARMs models. …”
Review -
5
Improved K-means clustering and adaptive distance threshold for energy reduction in WSN-IoTs
Published 2025“…This study introduces an enhanced energy aware clustering approach that combines an improved K-Means algorithm with an adaptive distance threshold to optimize relay node selection and cluster formation. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…The AGMB algorithm is built upon three algorithms: 1) Grid-Multi-Buffer Stream Clustering (GMBSC), 2) Cautious Grid-Multi-Buffer Stream Clustering (C-GMBSC) and 3) Adaptive-Grid-Multi-Buffer Stream Clustering (A-GMBSC). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Analysis of Chinese patents associated with incremental clustering algorithms: A review / Archana Chaudhari
Published 2022“…To achieve learning from such dynamic data sources, incremental clustering algorithms are used mandatorily. This mandate has given rise to increased patents related to incremental clustering concept, which is primarily a significant part of Machine Learning field. …”
Get full text
Get full text
Get full text
Article -
9
Lightweight ontology architecture for QoS aware service discovery and semantic CoAP data management in heterogeneous IoT environment
Published 2026“…The architecture employs Modified-Ordered Points to Identify the Clustering Structure (M-OPTICS) to cluster and eliminate redundant IoT data. …”
Get full text
Get full text
Get full text
Article -
10
Improving Network Consistency and Data Availability Using Fuzzy C Mean Clustering Algorithm in Wireless Sensor Networks
Published 2024thesis::doctoral thesis -
11
-
12
-
13
Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN
Published 2022“…Due to finite resource, multiple issues need to be considered in designing such system, including AG flight time, coverage radius and the achievable data rate of the ground-to-air system, thus an Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. EECPP consist of two algorithms which is Stop Point Prediction Algorithm using K-Means, which finding the stop point for the AG after grouping the IDs into clusters, and Path Planning Algorithm using Particle Swarm Optimization which connect all of the stop point in shortest route. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Text Extraction Algorithm for Web Text Classification
Published 2010“…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
Get full text
Get full text
Get full text
Thesis -
15
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
16
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
17
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…To date, many works have been addressed in investigating the use of data mining techniques (e.g., Clustering) in Web page application. …”
Get full text
Get full text
Get full text
Thesis -
18
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…The development on Web Application system uses An ActiveX technology approach. …”
Get full text
Get full text
Thesis -
19
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…Application of data mining techniques to the World Wide Web referred as Web mining where this term has been used in three distint ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
20
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis
