بدائل البحث:
iot algorithm » rd algorithm (توسيع البحث)
per algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث), search algorithm (توسيع البحث)
elements per » elementi per (توسيع البحث), elements _ (توسيع البحث)
implementing » implemented (توسيع البحث)
iot algorithm » rd algorithm (توسيع البحث)
per algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث), search algorithm (توسيع البحث)
elements per » elementi per (توسيع البحث), elements _ (توسيع البحث)
implementing » implemented (توسيع البحث)
-
1
Concurrent BIST Synthesis and Test Scheduling Using Genetic Algorithms
منشور في 2007"…This paper presents an efficient method for concurrent built-in self-test synthesis and test scheduling in high-level synthesis. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
2
Minimizing Deadline Misses of Mobile IoT Requests in a Hybrid Fog- Cloud Computing Environment
منشور في 2019احصل على النص الكامل
doctoralThesis -
3
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
4
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
-
5
Isolating Physical Replacement of Identical IoT Devices Using Machine and Deep Learning Approaches
منشور في 2021احصل على النص الكامل
doctoralThesis -
6
ECG Signal Reconstruction on the IoT-Gateway and Efficacy of Compressive Sensing Under Real-Time Constraints
منشور في 2018"…<p dir="ltr">Remote health monitoring is becoming indispensable, though, Internet of Things (IoTs)-based solutions have many implementation challenges, including energy consumption at the sensing node, and delay and instability due to cloud computing. …"
-
7
Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios
منشور في 2021"…An architecture for implementing QKD in beyond 5G IoT networks is proposed, offloading the heavy computational tasks to IoT controllers. …"
-
8
MAESTRO: Orchestrating Computational Offloading to Multiple FemtoClouds in Various Communication Environments
منشور في 2022"…<p dir="ltr">Many novel IoT-based applications demand low latency, large compute resources, and high privacy. …"
-
9
-
10
-
11
Correlation Clustering with Overlaps
منشور في 2020"…We present a heuristic algorithm and a semi-exact algorithm for the Multi-Parameterized Cluster Editing with Vertex Splitting problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
12
-
13
-
14
A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
منشور في 2021"…Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …"
-
15
Multidimensional Gains for Stochastic Approximation
منشور في 2019"…The proposed algorithms here aim for per-iteration minimization of the mean square estimate error. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
16
On the complexity of multi-parameterized cluster editing
منشور في 2017"…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
17
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…Based on these promising results, we have opted to deploy SDN-ML-IoT within the SDN. This implementation ensures the safeguarding of IoT devices in smart homes against DDoS attacks within the network traffic.…"
-
18
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
منشور في 2023"…<p dir="ltr">Ensuring the privacy and trustworthiness of smart city—Internet of Things (IoT) networks have recently remained the central problem. …"
-
19
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
منشور في 2018"…Moreover, we propose a set of effective algorithms to generate solutions for relatively large-scale network scenarios. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
20
Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters
منشور في 2025"…The proposed method is sustainable, robust, adaptable to various households, and can be mass-implemented within smart meters at a much lower cost and effort compared to the traditional internet of things (IoT)-based intrusive systems.…"