Search Results - (( java application learning algorithm ) OR ( iot implementation matching algorithm ))
Search alternatives:
- implementation matching »
- application learning »
- learning algorithm »
- iot implementation »
- java application »
-
1
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…Most algorithms assume a collision slot means two tag collision. …”
Get full text
Get full text
Article -
2
-
3
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
4
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
5
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
6
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
7
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
8
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
9
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2022“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
10
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
11
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
12
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
13
-
14
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
16
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
17
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
18
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article -
19
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article -
20
