Search Results - (( its application tools algorithm ) OR ( iot application ((use algorithm) OR (tree algorithm)) ))*
Search alternatives:
- application tools »
- its application »
- tools algorithm »
- iot application »
- tree algorithm »
- use algorithm »
-
1
-
2
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
3
'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 T...
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter -
4
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al...
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter -
5
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
6
Intersection Features For Android Botnet Classification
Published 2019“…The Chi Square was used to select the most significant permissions, then the classification algorithms like Naïve Bayes and Decision Tree were used to classify the Android apps as botnet or benign apps. …”
Get full text
Get full text
Get full text
Article -
7
Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning
Published 2026Get full text
Get full text
Get full text
Proceeding Paper -
8
A review on internet of things (IoT) based water monitoring system
Published 2023“…The traditional method to monitor water quality and quantity has been a quite difficult task involving a large amount of labour and cash. But the IoT application slashes human involvement and most of the procedural decisions are made by algorithms. …”
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…Our approach is, therefore, highly effective and efficient, with the potential to be used in real-world network security applications.…”
Get full text
Get full text
Article -
13
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…The scheme was tested for its security analysis using the formal security verification under the widely accepted AVISPA tool. …”
Get full text
Get full text
Article -
14
A case study of unmanned aerial vehicle (drone) technology and its applications in the COVID-19 pandemic
Published 2022“…On the other hand, a soft computing approach such as artificial intelligence (A.I.), the internet of things (IoT), neural network, fuzzy logic, genetic algorithm, and machine learning has become crucial in the design and application of UAVs. …”
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
-
18
Portable Stress Detection System for Autistic Children Using Fuzzy Logic
Published 2024journal::journal article -
19
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
20
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis
