Search Results - (( java implementation developing algorithm ) OR ( iot implementation detection algorithm ))
Search alternatives:
- implementation developing »
- implementation detection »
- java implementation »
- iot implementation »
-
1
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
Get full text
Get full text
Article -
2
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…The significance of this study lies in detecting botnets in IoT devices effectively and efficiently under all circumstances by utilizing ICA with Random Forest Classifier, which is a simple machine learning algorithm.…”
Get full text
Get full text
Article -
3
Home intruder detection system using machine learning and IoT
Published 2022“…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
Get full text
Get full text
Get full text
Article -
4
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
Published 2020“…The experiment indicates that deep learning algorithms are suitable for intrusion detection in IoT network environment…”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
A study on obstacle detection for IoT based automated guided vehicle (AGV)
Published 2022“…The research concludes that the IoT-based AGV prototype is competent and reliable in handling the obstacle detection in fixed route with indoor environment workplace.…”
Get full text
Get full text
Get full text
Article -
6
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Internet of Things (IoT) applications for estrus detection and management in precision livestock farming: a review
Published 2026“…Recent advancements in the Internet of Things (IoT) have introduced new opportunities to enhance estrus detection through the integration of sensors, data analytics, and machine learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
9
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
10
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
11
Fire alarm system with real-time monitoring and alert system using IOT / Muhammad Habib Shaharuddin
Published 2024“…This paper covers the design and implementation of an Internet of Things (IoT)-based fire alarm system with real-time monitoring and alerting features. …”
Get full text
Get full text
Student Project -
12
Faulty sensor detection mechanism using multi-variate sensors in IoT
Published 2019“…Internet of Thing (IoT) becoming increasingly popular over the past few years because it can be implemented in many applications such as smart cities, smart agriculture, smart health, smart home and etc. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Performance Analysis In IoT Based Home Automation Using Hybrid RS-LDPC Codes
Published 2018“…The error detection and correction algorithms implemented in home automation system is successfully developed by encoding and decoding the text messages that transmitted from webpage to Raspberry Pi board using Python and HTML programming language. …”
Get full text
Get full text
Monograph -
14
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
15
IOT BASED CAR PARKING MANAGEMENT SYSTEM USING CAR PLATE RECOGNITION
Published 2019“…The rapid growth of the Internet of Thing (IoT) was lead to a more robust IoT platform. These IoT platforms provide higher processing power that allows the implementation into the more complicated application. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
16
-
17
Wireless IoT smart door lock using Viola-Jones face detection technique / Samsiah Ahmad...[et al.]
Published 2020“…The prototype of the wireless IoT Smart Door Lock based on Viola-Jones face detection technique has been tested and the accuracy of classification at different face angles (front, left, right, top, down) were recorded and also presented in this paper. …”
Get full text
Get full text
Get full text
Article -
18
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
19
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The RNN, CNN, LSTM, and CNN-BiLSTM are implemented and tested to determine the most effective model against DDoS attacks that can accurately detect and distinguish DDoS from legitimate traffic. …”
Get full text
Get full text
Get full text
Article -
20
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The RNN, CNN, LSTM, and CNN-BiLSTM are implemented and tested to determine the most effective model against DDoS attacks that can accurately detect and distinguish DDoS from legitimate traffic. …”
Get full text
Get full text
Get full text
Article
