Search Results - (( its application learning algorithm ) OR ( iot application ((a algorithm) OR (_ algorithm)) ))
Search alternatives:
- application learning »
- learning algorithm »
- its application »
- iot application »
- a algorithm »
-
1
-
2
IOT-based fertigation system / Mohamad Amir Furqan Darus
Published 2024“…These sensors provide real-time data about the crops’ environment, which is then sent to a central hub or cloud platform. Advanced algorithms and machine learning processes this data to determine the ideal irrigation and fertilization needs. …”
Get full text
Get full text
Student Project -
3
Home intruder detection system using machine learning and IoT
Published 2022“…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
Get full text
Get full text
Get full text
Article -
4
'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Algorithms, Edited By Norliza Katuk, Roberto Vergallo, Tito Sugiharto, Copyright 2024".
Published 2024“…It offers readers a detailed understanding of how computer science intersects with Industry 5.0, how to humanise it, and its application to industry. …”
Get full text
Get full text
Get full text
Book Chapter -
5
Fog-cloud scheduling simulator for reinforcement learning algorithms
Published 2023“…Fog computing is a popular choice for Internet of Things (IoT) applications, such as electricity, health, transportation, smart cities, security, and more. …”
Get full text
Get full text
Article -
6
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…Here, the novelty of the work is the application of MVO algorithm in fine-turning the hyperparameters involved in BiGRU model. …”
Get full text
Get full text
Get full text
Article -
7
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al...
Published 2024“…It offers readers a detailed understanding of how computer science intersects with Industry 5.0, how to humanise it, and its application to industry. …”
Get full text
Get full text
Get full text
Book Chapter -
8
Smart agriculture: precision farming through sensor-based crop monitoring and control system
Published 2024“…Consequently, this project endeavours to develop a system that seamlessly integrates both IoT and machine learning components, culminating in an advanced system capable of real-time crop monitoring and growth prediction. …”
Get full text
Get full text
Get full text
Article -
9
Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning
Published 2026Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
12
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
13
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
-
17
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…Secondly, a hybrid Genetic Algorithm and Enhanced Inertia Weight Particle Swarm Optimization (GAEIWPSO) algorithm for optimal resource allocation to minimize the delay is proposed. …”
Get full text
Get full text
Thesis -
18
Selective of IoT applications for water quality monitoring in Malaysia
Published 2024“…Our disease detection system utilizes real-time sensors, machine learning algorithms, and IoT technology to swiftly identify pathogen indicators. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Intelligent decision support systems: transforming smart cities management
Published 2024Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
A case study of unmanned aerial vehicle (drone) technology and its applications in the COVID-19 pandemic
Published 2022“…On the other hand, a soft computing approach such as artificial intelligence (A.I.), the internet of things (IoT), neural network, fuzzy logic, genetic algorithm, and machine learning has become crucial in the design and application of UAVs. …”
Get full text
Get full text
Get full text
Article
