Search Results - (( developing iot selection algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Systematic review of intrusion detection system based on machine learning techniques for internet of things by Idris, Muhammad, Md Yasin, Sharifah, Audi, Giade Hamza

    Published 2023
    “…We highlighted the most efficient machine learning algorithms and feature selection techniques, along with strategies to address issues related to dataset imbalance in benchmarked datasets, with the goal of fostering the development of robust IDS solutions for IoT security.…”
    Get full text
    Get full text
    Article
  5. 5

    Intersection Features For Android Botnet Classification by Ismail, Najiahtul Syafiqah, Yusof, Robiah, Saad, Halizah, Abdollah, Mohd Faizal, Yusof, Robiah

    Published 2019
    “…Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Review and analysis of risk factor of maternal health in remote area using the Internet of Things (IoT) by Marzia, Ahmed, Kashem, Mohammod Abul, Rahman, Mostafijur, Sabira, Khatun

    Published 2020
    “…Regardless, few selected pregnant women’s data has been collected (through IoT enabled devices) and the same process also applied for this dataset also by using LMT. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Smart agriculture: precision farming through sensor-based crop monitoring and control system by Mohamad Hakhrani, Asyful Azhim, Abdul Hamid, Syamsul Bahrin

    Published 2024
    “…Subsequently, four distinct algorithms are trained with the collected dataset to ascertain the most optimal algorithm for predicting crop growth and harvesting time, resulting in the selection of the Random Forest Regression model, which attains the highest model score of 86%. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment by Ahmed Hamza, Manar, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, S. Alotaibi, Saud, Mahgoub, Hany, S. Mehanna, Amal, Motwakel, Abdelwahed

    Published 2022
    “…In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Chaotic map initializations with Tiki-Taka algorithm for software remodularization problem by Kamal Z., Zamli, Kader, Md. Abdul

    Published 2021
    “…Addressing this issue, this paper evaluates the performance of automated software remodularization using the newly developed Tiki-Taka Algorithm (TTA) and its variants with four chaotic map initializations based on Chebyshev map, Circle map, Logistic Map and Piecewise Map. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    A Survey on Distributed Topology Control Techniques for Extending the Lifetime of Battery Powered Wireless Sensor Networks by A. A Aziz, Azrina, Sekercioglu, Y. Ahmet, Fitzpatrick, Paul, Ivanovich, Milosh

    Published 2013
    “…Large-scale, self-organizing wireless sensor and mesh network deployments are being driven by recent technological developments such as The Internet of Things (IoT), Smart Grids and Smart Environment applications. …”
    Get full text
    Get full text
    Citation Index Journal
  12. 12
  13. 13

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    Design and development of smart parking system based on fog computing and internet of things by Balfaqih, M., Jabbar, W., Khayyat, M., Hassan, R.

    Published 2021
    “…Moreover, the parking‐spot selection process considers criteria that do not maximize parking utilization and revenue. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  19. 19

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  20. 20

    Development and integration of capacitive sensing and electrocuting grid for mosquitoes surveillance and control by Khoo, Brendan Teng Thiam

    Published 2020
    “…The final proposed system is tested with a basic species recognition algorithm and achieved species recognition rate of between 75% to 83% and selective trapping rate of between 63% to 69%.…”
    Get full text
    Get full text
    Get full text
    Thesis