Search Results - (( web application learning algorithm ) OR ( iot applications matching algorithm ))
Search alternatives:
- applications matching »
- application learning »
- learning algorithm »
- iot applications »
- web application »
-
1
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…E-Learning is one of the Web based application where it will facing with large amount of data. …”
Get full text
Get full text
Get full text
Thesis -
2
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…But in dense IoT applications, much more than two tags can constitute a collision slot. …”
Get full text
Get full text
Article -
3
Lightweight ontology architecture for QoS aware service discovery and semantic CoAP data management in heterogeneous IoT environment
Published 2026“…User requests, transmitted via the Constrained Application Protocol (CoAP), are semantically enriched and matched to QoS parameters using Dynamic Shannon Entropy optimized with the Salp Swarm Algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Web usage mining for UUM learning care using association rules
Published 2004“…Application of data milling techniques to the World Wide Web referred as Web mining where this term has been used in three distinct ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Thesis -
5
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
6
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Car dealership web application
Published 2022“…In this project, a web application and a web service were proposed and implemented. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Cyberbullying detection: a machine learning approach
Published 2022“…Machine learning is a hot topic and it is widely implemented in software, web application and more. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
IoT Technology Enabled Heuristic Model with Morlet wavelet neural network for numerical treatment of Heterogeneous Mosquito Release Ecosystem
Published 2021“…The utmost advancements of artificial neural networks (ANNs), software-defined networks (SDNs) and internet of things (IoT) technologies find beneficial in different applications of the smart healthcare sector. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
11
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
12
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
13
-
14
-
15
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
16
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
17
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
18
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
19
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
20
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2022“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article
