Search Results - (( developing iot detection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- developing iot »
- iot detection »
-
1
Home intruder detection system using machine learning and IoT
Published 2022“…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
Get full text
Get full text
Get full text
Article -
2
Preliminary analysis of malware detection in opcode sequences within IoT environment
Published 2020“…This paper attempts to provide a preliminary analysis for malware detection within data generated by IoT-based devices and services in the form of operational codes (Opcode) sequences. …”
Get full text
Get full text
Get full text
Article -
3
A study on obstacle detection for IoT based automated guided vehicle (AGV)
Published 2022“…Therefore, an IoT system is developed to allow a flexible wireless communication among mobile robots in an indoor industrial environment. …”
Get full text
Get full text
Get full text
Article -
4
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Systematic review of intrusion detection system based on machine learning techniques for internet of things
Published 2023“…Machine learning (ML)-based intrusion detection systems (IDS) offer a promising approach to enhancing IoT security by analysing real-time data from IoT devices. …”
Get full text
Get full text
Article -
6
Two-factor authentication smart entryway using modified LBPH algorithm
Published 2024“…Many face detection models have been developed in smart entryways using IoT. …”
Get full text
Get full text
Get full text
Article -
7
Hybrid ensemble learning techniques for intrusion detection systems in Internet of Things security
Published 2025“…Additionally, the diversity of IoT devices makes achieving reliable intrusion detection more difficult. …”
Get full text
Get full text
UMK Etheses -
8
Human presence detection system
Published 2024“…This paper presents the development and evaluation of an IoT-based human presence detection system leveraging microwave sensors. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Internet of Things (IoT) intrusion detection by Machine Learning (ML): a review
Published 2023“…The goal of this study is to show the results of analyzing various classification algorithms in terms of confusion matrix, accuracy, precision, specificity, sensitivity, and f-score to Develop an Intrusion Detection System (IDS) model.…”
Get full text
Get full text
Get full text
Article -
10
IoT – eye drowsiness detection system by using Intel Edison with GPS navigation
Published 2018“…Technology in digital computer system allows us to create a drowsiness detection sys-tem. Studies for drowsiness detector system has focused on development of computer vision algorithm and lack of Internet of Things (IoT) and notification system, either awake or sleep or might involve in accident, and current location. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
IOT – eye drowsiness detection system by using intel edison with gps navigation
Published 2019“…Technology in digital computer system allows us to create a drowsiness detection system. Studies for drowsiness detector system have focused on development of computer vision algorithm and lack of Internet of Things (IoT) and notification system, either awake or sleep or might involve in accident, and current location. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Development of a fall detection system based on neural network featuring IoT-Technology
Published 2021“…A backpropagation neural network algorithm has been developed to accurately distinguish falls from different postural transitions during activities of daily living (ADL). …”
Get full text
Get full text
Get full text
Article -
14
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
15
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
16
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
17
Iot health monitoring system for self quarantined covid-19 patients
Published 2022“…Then develop an IoT system to notify guardian or doctor on emergency situation. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
19
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
20
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article
