Search Results - (( iot application matching algorithm ) OR ( based application among algorithm ))*

Refine Results
  1. 1
  2. 2

    Lightweight ontology architecture for QoS aware service discovery and semantic CoAP data management in heterogeneous IoT environment by Sukhavasi, Suman, Perumal, Thinagaran, Mustapha, Norwati, Yaakob, Razali

    Published 2026
    “…User requests, transmitted via the Constrained Application Protocol (CoAP), are semantically enriched and matched to QoS parameters using Dynamic Shannon Entropy optimized with the Salp Swarm Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    IoT Technology Enabled Heuristic Model with Morlet wavelet neural network for numerical treatment of Heterogeneous Mosquito Release Ecosystem by Zulqurnain Sabir, Kashif Nisar, Muhammad Asif Zahoor Raja, Muhammad Reazul Haque, Muhammad Umar, Ag. Asri Ag. Ibrahim, Le, Dac-Nhuong

    Published 2021
    “…The utmost advancements of artificial neural networks (ANNs), software-defined networks (SDNs) and internet of things (IoT) technologies find beneficial in different applications of the smart healthcare sector. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed,, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Majeed Alhammadi, Nafea Ali, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Mohammed Saleh Ahmed, Ali, Ali Majeed Alhammadi,, Nafea, Ahmad Khalaf, Bashar, Mostafa, Salama A.

    Published 2023
    “…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Khalaf, Bashar Ahmad, Mostafa, Salama A.

    Published 2023
    “…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…On the second level, TOPSIS algorithm allocates resources among an application’s user based on their criteria and the application’s preferences. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network by Hindia, M.N., Reza, A.W., Noordin, K.A.

    Published 2015
    “…On the second level, TOPSIS algorithm allocates the resources among application's users based on their criteria and the application's preferences. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    The implementation of forward chaining algorithm in calculating inheritance property based on faraid law / Nur Ain Syafiqah Mohammad Marzuki by Mohammad Marzuki, Nur Ain Syafiqah

    Published 2021
    “…Therefore, the purpose of this study is to facilitate the use of Forward Chaining Algorithm to calculate Faraid based on inheritance division. …”
    Get full text
    Get full text
    Student Project
  19. 19

    Multi label ranking based on positive pairwise correlations among labels by Alazaidah, Raed, Ahmad, Farzana Kabir, Mohsin, Mohamad

    Published 2020
    “…The first objective is to propose a new multi-label ranking algorithm based on the positive pairwise correlations among labels, while the second objective aims to propose new simple PTMs that are based on labels correlations, and not based on labels frequency as in conventional PTMs. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Harmony Search-Based Fuzzy Clustering Algorithms For Image Segmentation by Alia, Osama Moh’d Radi

    Published 2011
    “…Various images from different application domains, including synthetic and real-world images, have been used in this thesis to show the applicability of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis