Search Results - (( iot applications learning algorithm ) OR ( based application using algorithm ))*

Refine Results
  1. 1

    IOT-based fertigation system / Mohamad Amir Furqan Darus by Darus, Mohamad Amir Furqan

    Published 2024
    “…The Fertigation, the precise application of water and fertilizers in agriculture, has evolved with the integration of Internet of Things (IoT) technology. …”
    Get full text
    Get full text
    Student Project
  2. 2
  3. 3

    Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system by Balla, Asaad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Mubarak, Sinil

    Published 2022
    “…For each algorithm, prior works have been identified, examined, and described based on their conceptual similarities. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT) by Jamal, A.A., Bakar, M.T.A.

    Published 2021
    “…Q-learning is one of the successful techniques available for the exploration of IoT nodes, but context based problems have already been established and simplified as issues of dedicated server management, IoT object data acquisition issues, and unique application requirements. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    A comprehensive survey of deep reinforcement learning in UAV-assisted IoT data collection by Ahmed Amodu, Oluwatosin, Althumali, Huda, Mohd Hanapi, Zurina, Jarray, Chedia, Raja Mahmood, Raja Azlina, Adam, Mohammed Sani, Bukar, Umar Ali, Abdullah, Nor Fadzilah, Luong, Nguyen Cong

    Published 2025
    “…Unmanned Aerial Vehicles (UAVs) play a critical role in data collection for a wide range of Internet of Things (IoT) applications across remote, urban, and marine environments. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Fog-cloud scheduling simulator for reinforcement learning algorithms by Al-Hashimi, Mustafa Ahmed Adnan, Rahiman, Amir Rizaan, Muhammed, Abdullah, Hamid, Nor Asilah Wati

    Published 2023
    “…Fog computing is a popular choice for Internet of Things (IoT) applications, such as electricity, health, transportation, smart cities, security, and more. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    IoT alarm system: detecting & preventing microsleep events by Azhar, Ahmad Mirza, Awang, Norkhushaini

    Published 2024
    “…Node-RED, a powerful visual programming tool used for developing IoT applications, facilitated the creation of an intuitive and informative dashboard.…”
    Get full text
    Get full text
    Book Section
  14. 14

    Towards paddy rice smart farming: a review on big data, machine learning, and rice production tasks by Rayner Alfred, Joe Henry Obit, Christie Chin Pei Yee, Haviluddin Haviluddin, Yuto Lim

    Published 2021
    “…This paper also presents a framework that maps the activities defined in rice smart farming, data used in data modelling and machine learning algorithms used for each activity defined in the production and post-production phases of paddy rice. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  19. 19

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  20. 20