Search Results - (( its application model algorithm ) OR ( iot applications using algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks by Al Ahmed, Mahmoud Tayseer, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Abdullah, Azizol

    Published 2023
    “…The current security model in IoT networks uses centralized key exchange servers that present a security weak point. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…Internet provides almost unlimited connection nowadays and it is widely used in our daily life such as in industrial, IoT and consumer applications. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…This may be useful for real-world applications such as surveillance systems based on IoT and customer behaviour analytics systems.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  15. 15

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  16. 16

    IoT based IMU sensor network for human arm pose estimation / Jahangir Hassan Khan by Jahangir , Hassan Khan

    Published 2019
    “…The Forward Kinematics approach has great advantage such as being easy to program and its faster computational speed, as compared to the conventional arm pose estimation algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A case study of unmanned aerial vehicle (drone) technology and its applications in the COVID-19 pandemic by Aabid, Abdul, Perveez, Bisma, Perveen, Nagma, Khan, Sher Afghan, Shabbir, Omar

    Published 2022
    “…On the other hand, a soft computing approach such as artificial intelligence (A.I.), the internet of things (IoT), neural network, fuzzy logic, genetic algorithm, and machine learning has become crucial in the design and application of UAVs. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Modeling arbiter-PUF in NodeMCU ESP8266 using artificial neural network by Mispan, Mohd Syafiq, Jidin, Aiman Zakwan, Mohd Nasir, Haslinah, Brahin, Noor Mohd Ariff, Mohd Nawi, Illani

    Published 2022
    “…ANN with a resilient back-propagation training algorithm is used as it can model the non-linearity with high accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20