Search Results - (( its application model algorithm ) OR ( iot application using algorithm ))*
Search alternatives:
- application model »
- its application »
- model algorithm »
- iot application »
- using algorithm »
-
1
-
2
-
3
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…The current security model in IoT networks uses centralized key exchange servers that present a security weak point. …”
Get full text
Get full text
Article -
4
-
5
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…Here, the novelty of the work is the application of MVO algorithm in fine-turning the hyperparameters involved in BiGRU model. …”
Get full text
Get full text
Get full text
Article -
6
Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning
Published 2026Get full text
Get full text
Get full text
Proceeding Paper -
7
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…Internet provides almost unlimited connection nowadays and it is widely used in our daily life such as in industrial, IoT and consumer applications. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…This may be useful for real-world applications such as surveillance systems based on IoT and customer behaviour analytics systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
12
-
13
Smart attendance system with Iot based face recognition using deep learning approach
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
15
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
16
IoT based IMU sensor network for human arm pose estimation / Jahangir Hassan Khan
Published 2019“…The Forward Kinematics approach has great advantage such as being easy to program and its faster computational speed, as compared to the conventional arm pose estimation algorithms. …”
Get full text
Get full text
Get full text
Thesis -
17
A case study of unmanned aerial vehicle (drone) technology and its applications in the COVID-19 pandemic
Published 2022“…On the other hand, a soft computing approach such as artificial intelligence (A.I.), the internet of things (IoT), neural network, fuzzy logic, genetic algorithm, and machine learning has become crucial in the design and application of UAVs. …”
Get full text
Get full text
Get full text
Article -
18
Modeling arbiter-PUF in NodeMCU ESP8266 using artificial neural network
Published 2022“…ANN with a resilient back-propagation training algorithm is used as it can model the non-linearity with high accuracy. …”
Get full text
Get full text
Get full text
Article -
19
-
20
