Search Results - (( java implementation path algorithm ) OR ( using iot learning algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…Additionally, the results of the deep learning algorithms will be evaluated using five confusion matrices, namely, accuracy, precision, recall, F1Score, and false-positive rate). …”
    Get full text
    Get full text
    Article
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis by Akash, Nazmus Sakib, Rouf, Shakir, Jahan, Sigma, Chowdhury, Amlan, Uddin, Jia

    Published 2022
    “…This paper represents a model that accounts for the detection of botnets through the use of machine learning algorithms. The model examined anomalies, commonly referred to as botnets, in a cluster of IoT devices attempting to connect to a network. …”
    Get full text
    Get full text
    Article
  6. 6

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Internet of Things (IoT) based activity recognition strategies in smart homes: a review by Babangida, Lawal, Perumal, Thinagaran, Mustapha, Norwati, Yaakob, Razali

    Published 2022
    “…The obtained data can be subjected to extensive preprocessing and feature extraction tasks before being learned using appropriate machine learning or deep learning algorithms to generate a model capable of managing human activities more effectively. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Architecture for latency reduction in healthcare internet-of-things using reinforcement learning and fuzzy based fog computing by Shukla, S., Hassan, M.F., Jung, L.T., Awang, A.

    Published 2019
    “…This hybrid approach integrates healthcare IoT devices with the cloud and uses fog services with Fuzzy Reinforcement Learning Data Packet Allocation (FRLDPA) algorithm. …”
    Get full text
    Get full text
    Article
  10. 10

    Architecture for latency reduction in healthcare internet-of-things using reinforcement learning and fuzzy based fog computing by Shukla, S., Hassan, M.F., Jung, L.T., Awang, A.

    Published 2019
    “…This hybrid approach integrates healthcare IoT devices with the cloud and uses fog services with Fuzzy Reinforcement Learning Data Packet Allocation (FRLDPA) algorithm. …”
    Get full text
    Get full text
    Article
  11. 11

    Water quality monitoring using machine learning and IoT: a review by Hasan, Tahsin Fuad, Kabbashi, Nassereldeen Ahmed, Saleh, Tanveer, Alam, Md. Zahangir, Abd Wahab, Mohd Firdaus, Nour, Abdurahman Hamid

    Published 2024
    “…The paper explores various ML algorithms, including supervised and unsupervised learning and deep learning, along with their applications, and discusses the use of IoT sensors for real-time monitoring of water quality parameters such as pH, dissolved oxygen, temperature, and turbidity.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions by Almazrouei O.S.M.B.H., Magalingam P., Hasan M.K., Shanmugam M.

    Published 2024
    “…The evaluation of the performance of these attack graph models using IoT networks or devices as case studies is also emphasized. …”
    Review
  13. 13

    IOT-based fertigation system / Mohamad Amir Furqan Darus by Darus, Mohamad Amir Furqan

    Published 2024
    “…It integrates the MDD3A Cytron motor driver for water pump control and the Ph sensor to monitor soil acidity or alkalinity. Using advanced algorithms and machine learning techniques, the system nalyses the collected data to determine optimal irrigation and fertilization requirements. …”
    Get full text
    Get full text
    Student Project
  14. 14
  15. 15

    Investigation of An Early Prediction System of Cardiac Arrest Using Machine Learning Techniques by Muhammad Afnan, Mohammad Nasir

    Published 2022
    “…Random Forest algorithm be used in this study which is got the best performance with 83% accuracy then the other algorithms in WEKA. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Internet of Things (IoT) intrusion detection by Machine Learning (ML): a review by Dehkordi, Iman Farhadian, Manochehri, Kooroush, Aghazarian, Vahe

    Published 2023
    “…This review paper discusses the many sorts of cybersecurity attacks that may be used against IoT devices. Also, K-Nearest Neighbour (KNN), Support Vector Machine (SVM), Decision Tree (DT), Random Forest (RF), Naive Bayes (NB), and Artificial Neural Network (ANN) are examples of Machine Learning (ML) approaches that can be employed in IDS. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT) by Jamal, A.A., Bakar, M.T.A.

    Published 2021
    “…As the chosen model to be implemented in this analysis, the Q-learning algorithm proposal offers a possible solution for addressing evolving IoT environments and configurations. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Real-time and predictive analytics of air quality with IoT system: A review by Nurmadiha, Osman, Mohd Faizal, Jamlos, Fatimah, Dzaharudin, Aidil Redza, Khan, You, Kok Yeow, Khairil Anuar, Khairi

    Published 2020
    “…(iv) Data analytics for Air Pollution Index (API) prediction along with IoT, with various communication protocols can as-sist in the development of real-time, and continuous high precision environmen-tal monitoring systems. v) Machine Learning (ML) Regression algorithm is suit-able for prediction and classification of concentration gas pollutant, while ANN and SVM algorithm is used for forecasting.…”
    Get full text
    Get full text
    Get full text
    Book Chapter
  20. 20

    Trust-aware authentication and authorization for IoT: a federated machine learning approach by Ahmed, Kazi Istiaque, Tahir, Mohammad, Lau, Sian Lun, Habaebi, Mohamed Hadi, Ahad, Abdul, Mughees, Amna

    Published 2024
    “…The proposed solution for AA IoT utilizes a trust calculation algorithm based on Federated Learning (FL), which is suitable for IoT environments and enables data privacy and scalability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article