Search Results - (( web application based algorithm ) OR ( iot applications ((use algorithm) OR (tree algorithm)) ))
Search alternatives:
- application based »
- iot applications »
- web application »
- tree algorithm »
- use algorithm »
-
1
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
2
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
3
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. Furthermore, this project uses CT-UNO (Arduino Uno) microcontroller as its base together with the LM-35 Body Temperature sensor and the Pulse Sensor for reading heart rate, and a web system to manage the data collected. …”
Get full text
Get full text
Book Section -
4
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
5
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
6
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
7
Intersection Features For Android Botnet Classification
Published 2019“…The Chi Square was used to select the most significant permissions, then the classification algorithms like Naïve Bayes and Decision Tree were used to classify the Android apps as botnet or benign apps. …”
Get full text
Get full text
Get full text
Article -
8
-
9
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Internet of things (IoT) based grid tension monitoring system
Published 2022Get full text
Get full text
Undergraduates Project Papers -
11
Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system
Published 2022“…The AllThingsTalkMaker IoT server is integrated into the TTN to be accessed using Web/mobile application interfaces. …”
Get full text
Get full text
Get full text
Article -
12
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…Our approach is, therefore, highly effective and efficient, with the potential to be used in real-world network security applications.…”
Get full text
Get full text
Article -
13
Design of monitoring and control system of electricity power limiter using internet of things
Published 2025“…Users can access information related to electricity usage via web-based or mobile applications that provide data display in the form of a reports. …”
Get full text
Get full text
Book Section -
14
Enhancing geographic coordinates representation standard for reverse geocoding web services
Published 2018“…Reverse-geocoding is Location Base Services (LBS) that supports mobile and web applications. …”
Get full text
Get full text
Thesis -
15
Implementation of machine learning techniques with big data and IoT to create effective prediction models for health informatics
Published 2024“…Likewise, in this paper, a machine learning-based big data analytics model is developed for predictingmulti-diseases to provide a better decision support system for various healthcare applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
-
18
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
19
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…The proposed routing algorithm is simulated using MATLAB for performance evaluations. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper
