Search Results - (( based applications learning algorithm ) OR ( things applications using algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system by Balla, Asaad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Mubarak, Sinil

    Published 2022
    “…For each algorithm, prior works have been identified, examined, and described based on their conceptual similarities. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Diagnosis of breast cancer using case-based reasoning by Nurramlah, Abu Nasir

    Published 2012
    “…The application used the 100 data of Wisconsin Breast Cancer dataset for evaluating the CBR algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    IOT-based fertigation system / Mohamad Amir Furqan Darus by Darus, Mohamad Amir Furqan

    Published 2024
    “…The Fertigation, the precise application of water and fertilizers in agriculture, has evolved with the integration of Internet of Things (IoT) technology. …”
    Get full text
    Get full text
    Student Project
  6. 6

    DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH by LUONG, TRUNG TUAN

    Published 2005
    “…New tools based both on clever applications of established algorithms and on new methodologies, empower us to do entirely new things. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Fog-cloud scheduling simulator for reinforcement learning algorithms by Al-Hashimi, Mustafa Ahmed Adnan, Rahiman, Amir Rizaan, Muhammed, Abdullah, Hamid, Nor Asilah Wati

    Published 2023
    “…Fog computing is a popular choice for Internet of Things (IoT) applications, such as electricity, health, transportation, smart cities, security, and more. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT) by Jamal, A.A., Bakar, M.T.A.

    Published 2021
    “…We found the concept was developed in previous researches, especially based on widely accepted concepts of Q-Learning discovery model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    A review on machine learning in smart antenna: methods and techniques by Mohammed Sadiq, Sulaiman, Nasri, Mohd Isa, Maryam, Hamidon, Mohd Nizar

    Published 2022
    “…In this paper, the antenna array and antenna developed for the Internet of Things applications were highlighted. In this paper, we review how machine learning techniques can handle these applications effectively and what the concept of adaptive antenna is and when it can be used in this day and age characterized by the rapid development of information technology.…”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  15. 15

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  16. 16

    Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device by Shanmuga, Pillai A/L Murutha Muthu

    Published 2021
    “…This research will investigate the application of the Symbolic Aggregate Approximation (SAX) algorithm on top of known supervised machine learning techniques to perform EEG signal classification. …”
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site by Wanbo, Luo

    Published 2025
    “…Therefore, this thesis explores and studies public hardhat datasets, deep learning algorithms, power Internet of Things (PIoT), and edge computing to address the above issues. …”
    Get full text
    Get full text
    Thesis
  20. 20