Search Results - (( _ application means algorithm ) OR ( iot application using algorithm ))*

Refine Results
  1. 1
  2. 2

    A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions by Almazrouei O.S.M.B.H., Magalingam P., Hasan M.K., Shanmugam M.

    Published 2024
    “…In this review, core modeling techniques for IoT vulnerability assessment are highlighted, such as Markov Decision Processes (MDP), Feature Pyramid Networks (FPN), K-means clustering, and logistic regression models, along with other techniques involving genetic algorithms like fast-forward (FF), contingent fast-forwards (CFF), advanced reinforcement-learning algorithms, and HARMs models. …”
    Review
  3. 3

    Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway by Nurul Saliha A. Ibrahim, Nurul Saliha A. Ibrahim, Faiz A. Saparudin, Faiz A. Saparudin

    Published 2023
    “…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN by Ibrahim, Nurul Saliha Amani

    Published 2022
    “…Due to finite resource, multiple issues need to be considered in designing such system, including AG flight time, coverage radius and the achievable data rate of the ground-to-air system, thus an Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. EECPP consist of two algorithms which is Stop Point Prediction Algorithm using K-Means, which finding the stop point for the AG after grouping the IDs into clusters, and Path Planning Algorithm using Particle Swarm Optimization which connect all of the stop point in shortest route. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    IoT Soil Moisture Monitoring and Irrigation System Development by Chew, Kim Mey, Syvester Tan, Chiang Wei, Gary Loh, Chee Wyai, Nancy, Bundan, Yiiong, Siew Ping

    Published 2020
    “…Robotics or chemical technologies may not be the only improvements that could be exercised. Internet of Things (IoT) technology is one of an application widely used currently. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  9. 9

    IoT Technology Enabled Heuristic Model with Morlet wavelet neural network for numerical treatment of Heterogeneous Mosquito Release Ecosystem by Zulqurnain Sabir, Kashif Nisar, Muhammad Asif Zahoor Raja, Muhammad Reazul Haque, Muhammad Umar, Ag. Asri Ag. Ibrahim, Le, Dac-Nhuong

    Published 2021
    “…An artificial neural network with the layer structure of Morlet wavelet (MWNN) kernel is presented using the global and local search optimization schemes of genetic algorithm (GA) and active-set algorithm (ASA), i.e., MWNN-GA-ASA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A review on internet of things (IoT) based water monitoring system by Malaika Shaikha, Azad Alia, Riaz Ahmed, Babar Ali Shaikh

    Published 2023
    “…The traditional method to monitor water quality and quantity has been a quite difficult task involving a large amount of labour and cash. But the IoT application slashes human involvement and most of the procedural decisions are made by algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20