Search Results - (( based verification _ algorithm ) OR ( iot applications learning algorithms ))*
Search alternatives:
- applications learning »
- based verification »
- iot applications »
-
1
-
2
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…In this review, core modeling techniques for IoT vulnerability assessment are highlighted, such as Markov Decision Processes (MDP), Feature Pyramid Networks (FPN), K-means clustering, and logistic regression models, along with other techniques involving genetic algorithms like fast-forward (FF), contingent fast-forwards (CFF), advanced reinforcement-learning algorithms, and HARMs models. …”
Review -
4
Water quality monitoring using machine learning and IoT: a review
Published 2024“…The paper explores various ML algorithms, including supervised and unsupervised learning and deep learning, along with their applications, and discusses the use of IoT sensors for real-time monitoring of water quality parameters such as pH, dissolved oxygen, temperature, and turbidity.…”
Get full text
Get full text
Get full text
Get full text
Article -
5
IOT-based fertigation system / Mohamad Amir Furqan Darus
Published 2024“…The Fertigation, the precise application of water and fertilizers in agriculture, has evolved with the integration of Internet of Things (IoT) technology. …”
Get full text
Get full text
Student Project -
6
-
7
-
8
Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT)
Published 2021“…As the chosen model to be implemented in this analysis, the Q-learning algorithm proposal offers a possible solution for addressing evolving IoT environments and configurations. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Home intruder detection system using machine learning and IoT
Published 2022Get full text
Get full text
Get full text
Article -
11
Real-time and predictive analytics of air quality with IoT system: A review
Published 2020“…(iv) Data analytics for Air Pollution Index (API) prediction along with IoT, with various communication protocols can as-sist in the development of real-time, and continuous high precision environmen-tal monitoring systems. v) Machine Learning (ML) Regression algorithm is suit-able for prediction and classification of concentration gas pollutant, while ANN and SVM algorithm is used for forecasting.…”
Get full text
Get full text
Get full text
Book Chapter -
12
Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification
Published 2005“…The Proposed Cp Estimation Algorithm Is Based On The Alteration Tracking (At) Followed By An Estimation Algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
14
-
15
Deep reinforcement learning online offloading for SWIPT multiple access edge computing network
Published 2021“…More computation-intensive and low latency applications are emerging recently, and they are constrained by the computing power and battery life of internet of things (IoT). …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
16
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
17
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
18
Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning
Published 2026Get full text
Get full text
Get full text
Proceeding Paper -
19
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…Here, the novelty of the work is the application of MVO algorithm in fine-turning the hyperparameters involved in BiGRU model. …”
Get full text
Get full text
Get full text
Article -
20
Smart agriculture: precision farming through sensor-based crop monitoring and control system
Published 2024“…Notably, prevalent smart agriculture systems predominantly emphasize either IoT components for data monitoring and control or machine learning components for data analysis. …”
Get full text
Get full text
Get full text
Article
