Search Results - (( web application ((tree algorithm) OR (new algorithm)) ) OR ( iot application system algorithm ))
Search alternatives:
- system algorithm »
- web application »
- iot application »
- tree algorithm »
- new algorithm »
-
1
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
2
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
journal::journal article -
3
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
4
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A new architectural paradigm has emerged in SOA in recent years called REpresentational State Transfer (REST) that is also used to integrate loosely coupled service components, named RESTful web services, by system integration consortiums. …”
Get full text
Get full text
Article -
5
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A new architectural paradigm has emerged in SOA in recent years called REpresentational State Transfer (REST) that is also used to integrate loosely coupled service components, named RESTful web services, by system integration consortiums. …”
Get full text
Get full text
Article -
6
-
7
-
8
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
9
Car dealership web application
Published 2022“…Thus, explainable AI and AI monitoring become the integral components for any new development of commercial applications, including used car dealership web application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas
Published 2023“…We developed a new algorithm to measure and monitor flood levels and rate changes effectively. …”
Get full text
Get full text
Get full text
Article -
11
Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas
Published 2023“…We developed a new algorithm to measure and monitor flood levels and rate changes effectively. …”
Get full text
Get full text
Get full text
Article -
12
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…Furthermore, many IoT applications are time sensitive such as health monitory systems, augmented reality services, agriculture, pest control, online natural language processing, smart home applications, smart cities, safe driving, waste management, emergency response systems, and traffic control systems. …”
Get full text
Get full text
Thesis -
13
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
14
Implementation of machine learning techniques with big data and IoT to create effective prediction models for health informatics
Published 2024“…The required healthcare data is collected from external web sources. In the map phase, the statisticalfeatures and the Principal Component Analysis (PCA) features are extracted. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
16
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
17
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…Routing algorithms must ensure the data transmission in an efficient way, having proper knowledge of the IoT system. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. …”
Get full text
Get full text
Get full text
Article -
19
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
20
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper
