Search Results - (( deployment security selection algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Distributed Denial of Service detection using hybrid machine learning technique by Barati, Mehdi, Abdullah, Azizol, Udzir, Nur Izura, Mahmod, Ramlan, Mustapha, Norwati

    Published 2014
    “…Current paper proposes architecture of a detection system for DDoS attack. Genetic Algorithm (GA) and Artificial Neural Network (ANN) are deployed for feature selection and attack detection respectively in our hybrid method. …”
    Get full text
    Conference or Workshop Item
  3. 3

    SGM: Strategic Game Model for resisting node misbehaviour in IoT-Cloud ecosystem by Khan, Burhan Ul Islam, Anwar, Farhat, Abdul Rahman, Farah Diyana, Olanrewaju, Rashidah Funke, Goh, Khang Wen, Janin, Zuriati, Rahman, Md Arafatur

    Published 2022
    “…At the same time, a unique role is given to a node for restoring resources during communication or security operations. Adopting an analytical research methodology, the proposed model uses public and private cloud systems for integrating quality service delivery with secure agreements using a Global Trust Controller and core node selection controller to select an intermediate node for data propagation. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Multi-hop and mesh for LoRa networks: Recent advancements, issues, and recommended applications by Andrew Wei-loong Wong, Say leng goh, Mohammad Kamrul Hasan, Salmah Fattah

    Published 2024
    “…The approaches are systematically classified into four (4) aspects: energy awareness, concurrent access and duty cycle regulations, routing protocols, and security. The first aspect encompasses parameter selection, distance, and clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    SGM : Strategic game model for resisting node misbehaviour in IoT-cloud ecosystem by Khan, Burhan Ul Islam, Anwar, Farhat, Farah Diyana, Abdul Rahman, Olanrewaju, Rashidah Funke, Goh, Khang Wen, Zuriati, Janin, Rahman, Md Arafatur

    Published 2022
    “…At the same time, a unique role is given to a node for restoring resources during communication or security operations. Adopting an analytical research methodology, the proposed model uses public and private cloud systems for integrating quality service delivery with secure agreements using a Global Trust Controller and core node selection controller to select an intermediate node for data propagation. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…The study also explores the criteria for node formation and selection, proposing a multi-criterion, energyefficient routing mechanism that takes into account security and sets directions for future research. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Multi-criteria optimization framework for cloudlet computing in WMANs: integrating VL-WIDE and AHP for enhanced decision-making by Muwafaq, Layth, Noordin, Nor K, Othman, Mohamed, Ismail, Alyani, Hashim, Fazirulhisyam

    Published 2026
    “…Comprehensive time-series evaluations demonstrate that our framework significantly outperforms conventional systems and other benchmark algorithms, with VL-WIDE and AHP achieving the lowest root mean square error (RMSE) of 16.7, a 5.1% improvement over random selection. …”
    Get full text
    Get full text
    Article
  8. 8

    Smart Agriculture Economics and Engineering: Unveiling the Innovation Behind AI-Enhanced Rice Farming by Zun Liang, Chuan, Tham, Ren Sheng, Tan, Chek Cheng, Abraham Lim, Bing Sern, David Lau, King Luen, Chong, Yeh Sai

    Published 2024
    “…Subsequently, the selected superior modified stacked ensemble MLR-SVR-based algorithms are utilized to forecast the 5-year future rice production for each low-middle and upper-middle Southeast Asia nation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A Review of Electromagnetic Safety Protection Technologies by Wen, Zheng, Leong, Wai Yie

    Published 2025
    “…This paper provides a systematic review and comparative analysis of five pivotal electromagnetic-compatibility (EMC) and safety-protection technologies: the “OODA-loop”-based intelligent protection system, shielding techniques, energy-selective electromagnetic protection, cooperative electromagnetic-security suppression, and electromagnetic-noise jamming. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model by Kareem Thajeel, Isam, Samsudin, Khairulmizam, Hashim, Shaiful Jahari, Hashim, Fazirulhisyam

    Published 2023
    “…Thus, this study attempts to fill the gap by proposing a feature drift-aware algorithm for detecting the evolved XSS attacks. The proposed approach is a dynamic feature selection based on a deep Q-network multi-agent feature selection (DQN-MAFS) framework. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Machine Learning in Ambient Assisted Living for Enhanced Elderly Healthcare: A Systematic Literature Review by Mir, Aabid A., Khalid, Ahmad S., Musa, Shahrulniza, Fauzi, Mohammad Faizal Ahmad, Razak, Normy N., Tang, Tong Boon

    Published 2025
    “…The review methodically analyzes articles and papers from the year 2020, selected based on their relevance to AAL technologies, their use of ML algorithms, and their focus on elderly care. …”
    Get full text
    Get full text
    Article