Search Results - (( web application learning algorithm ) OR ( iot applications using algorithm ))*
Search alternatives:
- application learning »
- learning algorithm »
- applications using »
- iot applications »
- web application »
- using algorithm »
-
1
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
2
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
3
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
4
Implementation of machine learning techniques with big data and IoT to create effective prediction models for health informatics
Published 2024“…Likewise, in this paper, a machine learning-based big data analytics model is developed for predictingmulti-diseases to provide a better decision support system for various healthcare applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…E-Learning is one of the Web based application where it will facing with large amount of data. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Web usage mining for UUM learning care using association rules
Published 2004“…Application of data milling techniques to the World Wide Web referred as Web mining where this term has been used in three distinct ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Thesis -
9
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
10
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
11
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
12
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…The proposed routing algorithm is simulated using MATLAB for performance evaluations. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
14
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
18
-
19
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
20
Car dealership web application
Published 2022“…In this project, a web application and a web service were proposed and implemented. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
