Search Results - (( iot applications learning algorithms ) OR ( based application system algorithm ))

Refine Results
  1. 1

    IOT-based fertigation system / Mohamad Amir Furqan Darus by Darus, Mohamad Amir Furqan

    Published 2024
    “…This abstract outlines an IoT-based fertigation system, focusing on key components like the ESP32 (ESPDuino-32), MDD3A Cytron motor driver, EC sensor, and water pump, and emphasizes its advantages.The IoT system incorporates various sensors, including those for soil moisture, temperature, humidity, nutrients, and Ph. …”
    Get full text
    Get full text
    Student Project
  2. 2
  3. 3

    Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system by Balla, Asaad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Mubarak, Sinil

    Published 2022
    “…These methods could be hardware-based, such as Intrusion Detection Systems (IDS), software-based, or managerial-based. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Smart agriculture: precision farming through sensor-based crop monitoring and control system by Mohamad Hakhrani, Asyful Azhim, Abdul Hamid, Syamsul Bahrin

    Published 2024
    “…Consequently, this project endeavours to develop a system that seamlessly integrates both IoT and machine learning components, culminating in an advanced system capable of real-time crop monitoring and growth prediction. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    IoT alarm system: detecting & preventing microsleep events by Azhar, Ahmad Mirza, Awang, Norkhushaini

    Published 2024
    “…Node-RED, a powerful visual programming tool used for developing IoT applications, facilitated the creation of an intuitive and informative dashboard.…”
    Get full text
    Get full text
    Book Section
  8. 8
  9. 9

    Deep reinforcement learning online offloading for SWIPT multiple access edge computing network by Teckchai, Tiong, Ismail Saad, Tze, Kenneth Kin Teo, Herwansyah Lago

    Published 2021
    “…In this paper, a SWIPT-based MEC system is proposed, comprising a multi-antenna access point (AP), multiple single antenna low power IoT devices and a MEC server. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    A question-centric review on DRL-based optimization for UAV-assisted MEC sensor and IoT applications, challenges, and future directions by Ahmed Amodu, Oluwatosin, Raja Mahmood, Raja Azlina, Althumali, Huda, Jarray, Chedia, Adnan, Mohd Hirzi, Bukar, Umar Ali, Abdullah, Nor Fadzilah, Nordin, Rosdiadee, Ahmad Zukarnain, Zuriati

    Published 2025
    “…This paper aims to answer twelve important research questions relating to the research on DRL for Mobile Edge Computing (MEC)-based UAV-assisted sensor and IoT applications from 47 systematically selected articles. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  20. 20

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article