Search Results - (( iot applications ((based algorithm) OR (tree algorithm)) ) OR ( web application use algorithm ))

Refine Results
  1. 1
  2. 2

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…This was achieved through data transfer using Amazon Web Service (AWS-IoT) cloud connection. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.] by Kushan, Albin Lemuel, Anuar, Muhammad Hazwan, Mohd Supir, Mohd Hafifi, Ahmad Fadzil, Ahmad Firdaus, Zolkeplay, Anwar Farhan

    Published 2021
    “…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
    Get full text
    Get full text
    Book Section
  4. 4
  5. 5

    Intersection Features For Android Botnet Classification by Ismail, Najiahtul Syafiqah, Yusof, Robiah, Saad, Halizah, Abdollah, Mohd Faizal, Yusof, Robiah

    Published 2019
    “…This paper proposed an enhancement approach for Android botnet classification based on features selection and classification algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  7. 7

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
    Get full text
    Get full text
    Article
  10. 10

    Internet of things (IoT) based grid tension monitoring system by Lina Khalida, Norazmi

    Published 2022
    “…The Internet of things method use in this monitoring system is by using ThingSpeak web and Blynk application. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system by Jabbar, Waheb A., Annathurai, Sanmathy, Tajul Ariffin, A. Rahim, M. Fitri, Mohd Fauzi

    Published 2022
    “…The AllThingsTalkMaker IoT server is integrated into the TTN to be accessed using Web/mobile application interfaces. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Design of monitoring and control system of electricity power limiter using internet of things by Gunoto, Pamor, Yuliansyah, Toni, Nurdin, M., Hisyamuddin, .

    Published 2025
    “…Users can access information related to electricity usage via web-based or mobile applications that provide data display in the form of a reports. …”
    Get full text
    Get full text
    Book Section
  13. 13

    Enhancing geographic coordinates representation standard for reverse geocoding web services by Al-Habshi, Mohammed Mustafa Abdulrahman

    Published 2018
    “…Reverse-geocoding is Location Base Services (LBS) that supports mobile and web applications. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. In this paper, an ant colony optimization (ACO) based WSN routing algorithm for IoT has been proposed and analyzed to enhance scalability, to accommodate node mobility and to minimize initialization delay for time critical applications in the context of IoT to find the optimal path of data transmission, improvising efficient IoT communications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    An efficient IoT-based smart water meter system of smart city environment by Al-Madhrahi, R., Abdullah, J., Alduais, N. A. M., Mahdin, H.B., Saad, A. -M. H. Y., Nasser, A. B., Alduais, H. S.

    Published 2021
    “…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Implementation of machine learning techniques with big data and IoT to create effective prediction models for health informatics by Zamani, Abu Sarwar, Hassan Abdalla Hashim, Aisha, Shatat, Abdallah Saleh Ali, Akhtar, Md. Mobin, Rizwanullah, Mohammed, Mohamed, Sara Saadeldeen Ibrahim

    Published 2024
    “…The required healthcare data is collected from external web sources. In the map phase, the statisticalfeatures and the Principal Component Analysis (PCA) features are extracted. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article