Search Results - (( iot applications usage algorithm ) OR ( _ application ((acs algorithm) OR (bayes algorithm)) ))
Search alternatives:
- applications usage »
- iot applications »
- usage algorithm »
- bayes algorithm »
- acs algorithm »
-
1
Intersection Features For Android Botnet Classification
Published 2019“…Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
Get full text
Get full text
Get full text
Article -
2
Performance comparison of classification algorithms for EEG-based remote epileptic seizure detection in wireless sensor networks
Published 2014“…Identification of epileptic seizure remotely by analyzing the electroencephalography (EEG) signal is very important for scalable sensor-based health systems.Classification is the most important technique for wide-ranging applications to categorize the items according to its features with respect to predefined set of classes.In this paper, we conduct a performance evaluation based on the noiseless and noisy EEG-based epileptic seizure data using various classification algorithms including BayesNet, DecisionTable, IBK, J48/C4.5, and VFI.The reconstructed and noisy EEG data are decomposed with discrete cosine transform into several sub-bands.In addition, some of statistical features are extracted from the wavelet coefficients to represent the whole EEG data inputs into the classifiers.Benchmark on widely used dataset is utilized for automatic epileptic seizure detection including both normal and epileptic EEG datasets.The classification accuracy results confirm that the selected classifiers have greater potentiality to identify the noisy epileptic disorders.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
4
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
5
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
6
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The vulnerabilities in BLE 4.2 and 5.x add an attractive perspective to the security of IoT technology. The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
Get full text
Get full text
Thesis -
7
-
8
Text Categorization Using Naive Bayes Algorithm
Published 2005Get full text
Get full text
Get full text
Thesis -
9
Text categorization using naive bayes algorithm
Published 2006Get full text
Get full text
Conference or Workshop Item -
10
-
11
Naive bayes-guided bat algorithm for feature selection.
Published 2013“…Bio-inspired method called Bat Algorithm hybridized with a Naive Bayes classifier has been presented in this work. …”
Get full text
Get full text
Article -
12
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
13
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap
Published 2014“…This paper is mainly interested in near real-time wireless application with regards to Internet of Things (IoT). …”
Get full text
Get full text
Article -
15
Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap
Published 2014“…This paper is mainly interested in near real-time wireless application with regards to Internet of Things (IoT). …”
Get full text
Get full text
Thesis -
16
Internet of things security vulnerabilities and recommended solutions
Published 2018“…The application framework of IoT comprises of devices that are highly heterogeneous and compute migrations from sensor to IoT gateways to edge/fog computing to the cloud and then back to the client along with various alarming components. …”
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
-
20
Design and implementation of solar-powered with IoT-Enabled portable irrigation system
Published 2022“…Furthermore, the integration of the IoT concept has facilitated real-time monitoring and control of the pump; thus, enhancing the water usage efficiency and enabling convenient farming operations. …”
Get full text
Get full text
Get full text
Article
