يعرض 1 - 20 نتائج من 80 نتيجة بحث عن '(( element data algorithm ) OR ((( data deer algorithm ) OR ( things using algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 1
  2. 2

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT حسب Arumugam K (18456690)

    منشور في 2021
    "…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …"
  3. 3
  4. 4

    A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining حسب Koen Schaaf (14778139)

    منشور في 2021
    "…Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …"
  5. 5
  6. 6

    Bird’s Eye View feature selection for high-dimensional data حسب Samir Brahim Belhaouari (16855434)

    منشور في 2023
    "…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …"
  7. 7

    Industrial Internet of Things enabled technologies, challenges, and future directions حسب Shams Forruque, Ahmed

    منشور في 2023
    "…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 8

    Industrial Internet of Things enabled technologies, challenges, and future directions حسب Shams Forruque Ahmed (16517712)

    منشور في 2023
    "…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
  9. 9
  10. 10

    Intelligent Bilateral Client Selection in Federated Learning Using Game Theory حسب Wehbi, Osama

    منشور في 2022
    "…To overcome this problem, we present in this paper FedMint, an intelligent client selection approach for federated learning on IoT devices using game theory and bootstrapping mechanism. Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  11. 11

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review حسب Yasir Ali (799969)

    منشور في 2023
    "…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
  12. 12

    A Novel Big Data Classification Technique for Healthcare Application Using Support Vector Machine, Random Forest and J48 حسب Al-Manaseer, Hitham

    منشور في 2022
    "…The performance of the algorithms for accuracy was evaluated using the Healthcare (heart attack possibility) dataset, freely available on kagle. …"
    احصل على النص الكامل
  13. 13

    Delay Optimization in LoRaWAN by Employing Adaptive Scheduling Algorithm With Unsupervised Learning حسب Zulfiqar Ali (117651)

    منشور في 2023
    "…This paper aims to optimize the delay in LoRaWAN by using an Adaptive Scheduling Algorithm (ASA) with an unsupervised probabilistic approach called Gaussian Mixture Model (GMM). …"
  14. 14

    AI and IoT-based concrete column base cover localization and degradation detection algorithm using deep learning techniques حسب Khalid, Naji

    منشور في 2023
    "…Internet of Things (IoT) and Artificial Intelligence (AI) technologies are currently replacing the traditional methods of handling buildings, infrastructure, and facilities design, control, and maintenance due to their precision and ease of use. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 15
  16. 16
  17. 17

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
  18. 18
  19. 19
  20. 20