Search Results - (( its application using algorithms ) OR ( iot applications learning algorithm ))

Refine Results
  1. 1
  2. 2

    IOT-based fertigation system / Mohamad Amir Furqan Darus by Darus, Mohamad Amir Furqan

    Published 2024
    “…The Fertigation, the precise application of water and fertilizers in agriculture, has evolved with the integration of Internet of Things (IoT) technology. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…HIDES successfully achieves its objective in detecting persons precisely and alerting the detection to users through mobile application remotely. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 T... by Mohamad Nazim, Jambli, Mohamad Zul Haziq, Mohd Fadzli, Sinarwati, Mohamad Suhaili, Nur Haryani, Zakaria

    Published 2024
    “…Practical insights are offered alongside cutting-edge applications, such as blockchain, the Internet of Things (IoT), QR code, and augmented reality (AR), as well as the consideration of privacy, trust, and authentication through digital signatures. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  5. 5
  6. 6
  7. 7
  8. 8

    Fog-cloud scheduling simulator for reinforcement learning algorithms by Al-Hashimi, Mustafa Ahmed Adnan, Rahiman, Amir Rizaan, Muhammed, Abdullah, Hamid, Nor Asilah Wati

    Published 2023
    “…Fog computing is a popular choice for Internet of Things (IoT) applications, such as electricity, health, transportation, smart cities, security, and more. …”
    Get full text
    Get full text
    Article
  9. 9

    'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al... by Eka Wahyu, Aditya, Nur Haryani, Zakaria, Fazli, Azzali, Mohamad Nazim, Jambli

    Published 2024
    “…Practical insights are offered alongside cutting-edge applications, such as blockchain, the Internet of Things (IoT), QR code, and augmented reality (AR), as well as the consideration of privacy, trust, and authentication through digital signatures. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  10. 10
  11. 11

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  12. 12

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    A case study of unmanned aerial vehicle (drone) technology and its applications in the COVID-19 pandemic by Aabid, Abdul, Perveez, Bisma, Perveen, Nagma, Khan, Sher Afghan, Shabbir, Omar

    Published 2022
    “…On the other hand, a soft computing approach such as artificial intelligence (A.I.), the internet of things (IoT), neural network, fuzzy logic, genetic algorithm, and machine learning has become crucial in the design and application of UAVs. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20

    A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions by Almazrouei O.S.M.B.H., Magalingam P., Hasan M.K., Shanmugam M.

    Published 2024
    “…In this review, core modeling techniques for IoT vulnerability assessment are highlighted, such as Markov Decision Processes (MDP), Feature Pyramid Networks (FPN), K-means clustering, and logistic regression models, along with other techniques involving genetic algorithms like fast-forward (FF), contingent fast-forwards (CFF), advanced reinforcement-learning algorithms, and HARMs models. …”
    Review