Journal articles on the topic 'KNX protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'KNX protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Omar, Chamorro-Atalaya, Quesquen-Porras Angel, and Arce-Santillan Dora. "Lighting control network based on KNX protocol, for the reduction of energy consumption." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 19, no. 3 (2020): 1186–93. https://doi.org/10.11591/ijeecs.v19.i3.pp1186-1193.
Full textKartuzov, Aleksandr, Tatyana Kartuzova, and Lyudmila Seliverstova. "Laboratory stand for designing industrial KNX networks on Siemens logo! Communication modules." E3S Web of Conferences 140 (2019): 04008. http://dx.doi.org/10.1051/e3sconf/201914004008.
Full textChamorro Atalaya, Omar, Angel Quesquen-Porras, and Dora Arce Santillan. "Lighting control network based on KNX protocol, for the reduction of energy consumption." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1186. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1186-1193.
Full textPang, Dang Feng, Sheng Li Lu, Feng Xin Zhang, and Guang Zhao. "Design of Intelligent LED Lighting System Based on KNX Bus for Building." Applied Mechanics and Materials 734 (February 2015): 960–64. http://dx.doi.org/10.4028/www.scientific.net/amm.734.960.
Full textFeng, Tao, and Bugang Zhang. "Security Evaluation and Improvement of the Extended Protocol EIBsec for KNX/EIB." Information 14, no. 12 (2023): 653. http://dx.doi.org/10.3390/info14120653.
Full textZHANG, Guo-dong, and Xi-huang ZHANG. "Real-time analysis and improvement of KNX/EIB communication protocol." Journal of Computer Applications 32, no. 2 (2013): 370–73. http://dx.doi.org/10.3724/sp.j.1087.2012.00370.
Full textSolmaz Akar, Handan, Erdem Akboy, and Yilmaz Eyidogan. "Design and Implementation of a Power Supply for KNX Protocol." Turkish Journal of Electrical Power and Energy Systems 3, no. 2 (2023): 90–96. http://dx.doi.org/10.5152/tepes.2023.23010.
Full textVanus, Jan, Ojan M. Gorjani, and Petr Bilik. "Novel Proposal for Prediction of CO2 Course and Occupancy Recognition in Intelligent Buildings within IoT." Energies 12, no. 23 (2019): 4541. http://dx.doi.org/10.3390/en12234541.
Full textCariello, Simona, Dario Sanalitro, Alessandro Micali, Arturo Buscarino, and Maide Bucolo. "Brain–Computer-Interface-Based Smart-Home Interface by Leveraging Motor Imagery Signals." Inventions 8, no. 4 (2023): 91. http://dx.doi.org/10.3390/inventions8040091.
Full textKim, Jin, and Anseop Choi. "Reduction of lighting power consumption through lighting control using the KNX/digital addressable lighting interface protocol in liquefied natural gas carrier accommodation mock-up." Renewable and Sustainable Energy Reviews 182 (August 2023): 113374. http://dx.doi.org/10.1016/j.rser.2023.113374.
Full textM., Parhamfar, Shojaeian S., and Bandegani Z. "Feasibility Study and Design of Smart Low-Energy Building Electrical Installations (Case Study: Isfahan University, Virtual Faculty Building)." Energy Systems Research 6, no. 3(23) (2023): 57–74. http://dx.doi.org/10.25729/esr.2023.03.0006.
Full textLima, Luiz André da Silva Lima André da Silva, Thaís Telles Queiroz Lira, Tatiane Luciano Balliano, and Silvia Beatriz Beger Uchôa. "Prospecção de Tecnologias Educacionais em KNX." Cadernos de Prospecção 11, no. 5 (2018): 1546. http://dx.doi.org/10.9771/cp.v11i5.27209.
Full textLIMA, Luiz André da Silva Lima André da Silva, Thaís Telles Queiroz Lira, Tatiane Luciano Balliano, and Silvia Beatriz Beger Uchôa. "PROSPECÇÃO DE TECNOLOGIAS EDUCACIONAIS EM KNX." Cadernos de Prospecção 11, no. 5 (2018): 1546. http://dx.doi.org/10.9771/cp.v12i5.27209.
Full textBudati, Anil Kumar, Shayla Islam, Mohammad Kamrul Hasan, Nurhizam Safie, Nurhidayah Bahar, and Taher M. Ghazal. "Optimized Visual Internet of Things for Video Streaming Enhancement in 5G Sensor Network Devices." Sensors 23, no. 11 (2023): 5072. http://dx.doi.org/10.3390/s23115072.
Full textPurba, Ridhoi, Meutia Nauly, and Zaid. "Outdoor School Modeling at LPK Kaizen Nirel Center During the Covid-19 Pandemic Disaster." ABDIMAS TALENTA: Jurnal Pengabdian Kepada Masyarakat 7, no. 2 (2022): 619–24. http://dx.doi.org/10.32734/abdimastalenta.v7i2.7698.
Full textJuwaied, Abdulla, Lidia Jackowska-Strumillo, and Artur Sierszeń. "Enhancing Clustering Efficiency in Heterogeneous Wireless Sensor Network Protocols Using the K-Nearest Neighbours Algorithm." Sensors 25, no. 4 (2025): 1029. https://doi.org/10.3390/s25041029.
Full textSameera, N. "Protocol-Specific Intrusion Detection System using KNN Classifier." International Journal for Research in Applied Science and Engineering Technology 6, no. 5 (2018): 292–99. http://dx.doi.org/10.22214/ijraset.2018.5049.
Full textSamara, Ghassan, and Mohammad Aljaidi. "Efficient energy, cost reduction, and QoS based routing protocol for wireless sensor networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 1 (2019): 496–504. https://doi.org/10.11591/ijece.v9i1.pp496-504.
Full textAlzahrani, Ali, and Theyazn H. H. Aldhyani. "Artificial Intelligence Algorithms for Detecting and Classifying MQTT Protocol Internet of Things Attacks." Electronics 11, no. 22 (2022): 3837. http://dx.doi.org/10.3390/electronics11223837.
Full textAsha, Durafe, Jagtap Rahul, Kanojia Sunny, Kumath Arpan, and Mishra Sunny. "Chamber Gas Monitoring System using KNN Algorithm and Wireless Protocol." Journal of Advancement in Communication System 4, no. 1 (2021): 1–7. https://doi.org/10.5281/zenodo.4744418.
Full textJuwaied, Abdulla, and Lidia Jackowska-Strumillo. "Applying Machine Learning to DEEC Protocol: Improved Cluster Formation in Wireless Sensor Networks." Network 5, no. 3 (2025): 26. https://doi.org/10.3390/network5030026.
Full textVinaybhushan, P., and T. Hirwarkar. "PRIVACY-PERSERVING KNN CLASSIFICATION PROTOCOL OVER ENCRPTED RELATIONAL DATA IN THE CLOUD." Advances in Mathematics: Scientific Journal 9, no. 7 (2020): 4589–96. http://dx.doi.org/10.37418/amsj.9.7.27.
Full textLiu, Chuan-Ming, and Shu-Yu Fu. "Effective protocols for kNN search on broadcast multi-dimensional index trees." Information Systems 33, no. 1 (2008): 18–35. http://dx.doi.org/10.1016/j.is.2007.04.002.
Full textKhan, Muhammad Almas, Muazzam A. Khan, Sana Ullah Jan, et al. "A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT." Sensors 21, no. 21 (2021): 7016. http://dx.doi.org/10.3390/s21217016.
Full textCheng, Kefei, Yujie Deng, Liang Zhang, Xiaotong Cui, Jinghao Chen, and Wei Luo. "Research on ZigBee Device Recognition Based on Software Defined Radio." Journal of Physics: Conference Series 2290, no. 1 (2022): 012040. http://dx.doi.org/10.1088/1742-6596/2290/1/012040.
Full textSurya Prasetyo, Dimas, Karina Auliasari, and Muhammad Ridho Putra Syalabi. "Klasifikasi Serangan Jaringan Menggunakan Metode K-Nearest Neighbour pada Data Riwayat Jaringan." Prosiding SENIATI 7, no. 1 (2023): 63–71. http://dx.doi.org/10.36040/seniati.v7i1.7874.
Full textOkola, Vitalis, J. Guyo, L. Okutoyi, A. Osoti, and M. Ogeng'o. "Effectiveness of a group B streptococcus protocol on screening and intrapartum antibiotic prophylaxis at Kenyatta National Hospital." Journal of Obstetrics and Gynaecology of Eastern and Central Africa 29, no. 1 (2017): 3–6. http://dx.doi.org/10.59692/jogeca.v29i1.345.
Full textKaushik, Sheetal, Khushboo Tripathi, Rashmi Gupta, and Prerna Mahajan. "Performance optimization of multipath K-AOMDV protocol using SVM against blackhole attack." Journal of Autonomous Intelligence 7, no. 5 (2024): 1488. http://dx.doi.org/10.32629/jai.v7i5.1488.
Full textFirman, Daru April, Hartomo Kristoko Dwi, and Purnomo Hindriyanto Dwi. "IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5782–91. https://doi.org/10.11591/ijece.v13i5.pp5782-5791.
Full textAbdan, Masoud, and Seyed Amin Hosseini Seno. "Machine Learning Methods for Intrusive Detection of Wormhole Attack in Mobile Ad Hoc Network (MANET)." Wireless Communications and Mobile Computing 2022 (January 31, 2022): 1–12. http://dx.doi.org/10.1155/2022/2375702.
Full textKim, Hyeong-Jin, Hyunjo Lee, Yong-Ki Kim, and Jae-Woo Chang. "Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing." Journal of Supercomputing 78, no. 7 (2022): 9245–84. http://dx.doi.org/10.1007/s11227-021-04286-2.
Full textKarrar, Falih Hassan, and Ebady Manaa Mehdi. "Detection and mitigation of DDoS attacks in internet of things using a fog computing hybrid approach." Bulletin of Electrical Engineering and Informatics 11, no. 3 (2022): 1604~1613. https://doi.org/10.11591/eei.v11i3.3643.
Full textDaru, April Firman, Kristoko Dwi Hartomo, and Hindriyanto Dwi Purnomo. "IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5782. http://dx.doi.org/10.11591/ijece.v13i5.pp5782-5791.
Full textKomatsuda, T., I. Nakamura, F. Takaiwa, and S. Oka. "Development of STS markers closely linked to the vrs1 locus in barley, Hordeum vulgare." Genome 41, no. 5 (1998): 680–85. http://dx.doi.org/10.1139/g98-069.
Full textAlotaibi, Nouf Saeed, Hassan I. Sayed Ahmed, Samah Osama M. Kamel, and Ghada Farouk ElKabbany. "Secure Enhancement for MQTT Protocol Using Distributed Machine Learning Framework." Sensors 24, no. 5 (2024): 1638. http://dx.doi.org/10.3390/s24051638.
Full textAmrullah, Muhammad, Awang Wardana, and Agus Arif. "Multi-oscillations Detection for Process Variables Based on K-Nearest Neighbor." ELKHA 15, no. 2 (2023): 120. http://dx.doi.org/10.26418/elkha.v15i2.68293.
Full textKim, Yong-Ki, Hyeong-Jin Kim, Hyunjo Lee, and Jae-Woo Chang. "Privacy-preserving parallel kNN classification algorithm using index-based filtering in cloud computing." PLOS ONE 17, no. 5 (2022): e0267908. http://dx.doi.org/10.1371/journal.pone.0267908.
Full textAgghey, Abel Z., Lunodzo J. Mwinuka, Sanket M. Pandhare, Mussa A. Dida, and Jema D. Ndibwile. "Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach." Symmetry 13, no. 11 (2021): 2192. http://dx.doi.org/10.3390/sym13112192.
Full textVahabzadeh-Hagh, Andrew M., Paul A. Muller, Alvaro Pascual-Leone, Frances E. Jensen, and Alexander Rotenberg. "Measures of Cortical Inhibition by Paired-Pulse Transcranial Magnetic Stimulation in Anesthetized Rats." Journal of Neurophysiology 105, no. 2 (2011): 615–24. http://dx.doi.org/10.1152/jn.00660.2010.
Full textK Singla, Rajeev, Varadaraj Bhat G, and TNV Ganesh Kumar. "3D-Quantitative Structure Activity Relationship: A Strategic Approach for In Silico Prediction of Anti-Candididal Action of 1,2,4- Triazole Derivatives." Indo Global Journal of Pharmaceutical Sciences 03, no. 01 (2013): 52–57. http://dx.doi.org/10.35652/igjps.2013.07.
Full textSung, Guo-Ming, Sachin D. Kohale, Te-Hui Chiang, and Yu-Jie Chong. "An Artificial Intelligence Home Monitoring System That Uses CNN and LSTM and is Based on the Android Studio Development Platform." Applied Sciences 15, no. 3 (2025): 1207. https://doi.org/10.3390/app15031207.
Full textLi, Wenchao, Ping Yi, Yue Wu, Li Pan, and Jianhua Li. "A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network." Journal of Electrical and Computer Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/240217.
Full textHassan, Karrar Falih, and Mehdi Ebady Manaa. "Detection and mitigation of DDoS attacks in internet of things using a fog computing hybrid approach." Bulletin of Electrical Engineering and Informatics 11, no. 3 (2022): 1604–13. http://dx.doi.org/10.11591/eei.v11i3.3643.
Full textTonkal, Özgür, Hüseyin Polat, Erdal Başaran, Zafer Cömert, and Ramazan Kocaoğlu. "Machine Learning Approach Equipped with Neighbourhood Component Analysis for DDoS Attack Detection in Software-Defined Networking." Electronics 10, no. 11 (2021): 1227. http://dx.doi.org/10.3390/electronics10111227.
Full textNaufal, Mohammad Farid, Selvia Ferdiana Kusuma, Zefanya Ardya Prayuska, et al. "Comparative Analysis of Image Classification Algorithms for Face Mask Detection." Journal of Information Systems Engineering and Business Intelligence 7, no. 1 (2021): 56. http://dx.doi.org/10.20473/jisebi.7.1.56-66.
Full textAljojo, Nahla. "Network Transmission Flags Data Affinity-based Classification by K-Nearest Neighbor." ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY 10, no. 1 (2022): 35–43. http://dx.doi.org/10.14500/aro.10880.
Full textNurjanah, Uli, P. Maria Hendrati, Anton Budi Dharmawan, and Nur Signa A. Gumilas. "Deteksi Gen Laten Membrane Protein-1 Epstein-Barr Virus Pada Karsinoma Nasofaring." Biosfera 33, no. 2 (2017): 76. http://dx.doi.org/10.20884/1.mib.2016.33.2.466.
Full textKhan, Rabia, Noshina Tariq, Muhammad Ashraf, Farrukh Aslam Khan, Saira Shafi, and Aftab Ali. "FL-DSFA: Securing RPL-Based IoT Networks against Selective Forwarding Attacks Using Federated Learning." Sensors 24, no. 17 (2024): 5834. http://dx.doi.org/10.3390/s24175834.
Full textA., Sabitha Banu, and Dr G. Padmavathi. "Hybrid Detection and Mitigation of DNS Protocol MITM attack based on Firefly algorithm with Elliptical Curve Cryptography." EAI Endorsed Transactions on Pervasive Health and Technology 8, no. 4 (2022): e3. http://dx.doi.org/10.4108/eetpht.v8i4.3081.
Full textDhiya Eddine, Abid, and Ghazli Abdelkader. "Securing DNS over HTTPS traffic: a real-time analysis tool." Computer Science and Information Technologies 5, no. 3 (2024): 227–34. http://dx.doi.org/10.11591/csit.v5i3.p227-234.
Full text