Search Results - (( java implementation developing algorithm ) OR ( iot implementation detection algorithm ))

Refine Results
  1. 1

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
    Get full text
    Get full text
    Article
  2. 2

    Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis by Akash, Nazmus Sakib, Rouf, Shakir, Jahan, Sigma, Chowdhury, Amlan, Uddin, Jia

    Published 2022
    “…The significance of this study lies in detecting botnets in IoT devices effectively and efficiently under all circumstances by utilizing ICA with Random Forest Classifier, which is a simple machine learning algorithm.…”
    Get full text
    Get full text
    Article
  3. 3

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    A study on obstacle detection for IoT based automated guided vehicle (AGV) by Loh, Jit Hao, M. Nafis, O. Z.

    Published 2022
    “…The research concludes that the IoT-based AGV prototype is competent and reliable in handling the obstacle detection in fixed route with indoor environment workplace.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment by Khalifa, Othman Omran, Ahmed, Muhammed Zaharadeen, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Internet of Things (IoT) applications for estrus detection and management in precision livestock farming: a review by Ashraf, Arselan, Nisa, Syed Qamrun, Ashraf, Afreen, Gunawan, Teddy Surya, Sophian, Ali

    Published 2026
    “…Recent advancements in the Internet of Things (IoT) have introduced new opportunities to enhance estrus detection through the integration of sensors, data analytics, and machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Fire alarm system with real-time monitoring and alert system using IOT / Muhammad Habib Shaharuddin by Shaharuddin, Muhammad Habib

    Published 2024
    “…This paper covers the design and implementation of an Internet of Things (IoT)-based fire alarm system with real-time monitoring and alerting features. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Faulty sensor detection mechanism using multi-variate sensors in IoT by Al-Atrakchii, Khaldoon Ammar

    Published 2019
    “…Internet of Thing (IoT) becoming increasingly popular over the past few years because it can be implemented in many applications such as smart cities, smart agriculture, smart health, smart home and etc. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Performance Analysis In IoT Based Home Automation Using Hybrid RS-LDPC Codes by Ng, Lay Wei

    Published 2018
    “…The error detection and correction algorithms implemented in home automation system is successfully developed by encoding and decoding the text messages that transmitted from webpage to Raspberry Pi board using Python and HTML programming language. …”
    Get full text
    Get full text
    Monograph
  14. 14

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    IOT BASED CAR PARKING MANAGEMENT SYSTEM USING CAR PLATE RECOGNITION by Yip, Zhi Chuan

    Published 2019
    “…The rapid growth of the Internet of Thing (IoT) was lead to a more robust IoT platform. These IoT platforms provide higher processing power that allows the implementation into the more complicated application. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  16. 16
  17. 17

    Wireless IoT smart door lock using Viola-Jones face detection technique / Samsiah Ahmad...[et al.] by Samsiah, Ahmad, Muhammad Farhan, Ramli, Zalikha, Zulkifli, Lily Marlia, Abdul Latif

    Published 2020
    “…The prototype of the wireless IoT Smart Door Lock based on Viola-Jones face detection technique has been tested and the accuracy of classification at different face angles (front, left, right, top, down) were recorded and also presented in this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed,, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The RNN, CNN, LSTM, and CNN-BiLSTM are implemented and tested to determine the most effective model against DDoS attacks that can accurately detect and distinguish DDoS from legitimate traffic. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Majeed Alhammadi, Nafea Ali, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The RNN, CNN, LSTM, and CNN-BiLSTM are implemented and tested to determine the most effective model against DDoS attacks that can accurately detect and distinguish DDoS from legitimate traffic. …”
    Get full text
    Get full text
    Get full text
    Article