Search Results - (( basic optimization sensor algorithm ) OR ( using detection based algorithm ))

Refine Results
  1. 1

    On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks by Ismail Abdullah, Kalid Abdlkader Marsal

    Published 2024
    “…For the proliferation of wireless sensor network, in different environments, an escalation in the lifetime of wireless sensors is mandatory, because among the basic issues concerning WSN is a successful effort to document the coverage of the number of target fields, while maximizing the lifetime of this network. …”
    Article
  2. 2

    Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks by Han, Fengrong

    Published 2022
    “…This study developed an optimized variation of the DV-Hop localization algorithm for anisotropic wireless sensor networks. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Efficient transmission based on genetic evolutionary algorithm by Jin Fan, Kit Guan Lim, Helen Sin Ee Chuo, Min Keng Tan, Ali Farzamnia, Kenneth Tze Kin Teo

    Published 2022
    “…In this paper, an energy-saving mechanism based on genetic algorithm in wireless sensor network (WSN) is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  4. 4

    Even-odd scheduling based energy efficient routing for wireless sensor network (WSN) / Muhammad Zafar Iqbal Khan by Khan, Muhammad Zafar Iqbal

    Published 2022
    “…Wireless Sensor Network (WSN) is basically composed of battery powered devices which have an obvious limitation of energy on sensors nodes, so it is the foremost motivation to develop a method to save energy of wireless sensor networks where networks are kept alive for a long time. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective by Ul haq, Riaz, Norrozila, Sulaiman, Muhammad, Alam

    Published 2013
    “…This survey paper is focused on the discussion of best optimal path routing algorithms in wireless sensor networks by using supervised machine learning approaches. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller by Zaridah, Mat Zain

    Published 2010
    “…The performances obtained show that the optimized APFLC is better than the non-optimize APFLC in terms of RMSE and the settling time.…”
    Get full text
    Thesis
  7. 7

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    A hybrid prediction model for pipeline corrosion using Artificial Neural Network with Particle Swarm Optimization by Ee, L.K., Aziz, I.A.

    Published 2018
    “…This project aims to develop a hybrid prediction Model which can target specific corrosion damage mechanisms. The basic ANN Model will be improved by integrating the Particle Swarm Optimization (PSO) algorithm to achieve a better and optimal performance. …”
    Get full text
    Get full text
    Article
  9. 9

    A hybrid prediction model for pipeline corrosion using Artificial Neural Network with Particle Swarm Optimization by Ee, L.K., Aziz, I.A.

    Published 2018
    “…This project aims to develop a hybrid prediction Model which can target specific corrosion damage mechanisms. The basic ANN Model will be improved by integrating the Particle Swarm Optimization (PSO) algorithm to achieve a better and optimal performance. …”
    Get full text
    Get full text
    Article
  10. 10

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…The algorithms have been applied on the KDD99 dataset, which is the benchmark dataset used for anomaly-based detection technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali by Mohd Ali, Nurul Amira

    Published 2020
    “…The objectives of the project are to design and develop a prototype of adaptive Glioblastoma detection using Evolutionary-based algorithm to assist in detecting brain tumor and also to test the prototype’s functionality and detection accuracy. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Fire Detection Algorithm using Image Processing Techniques by Poobalan, Kumarguru, Liew, Siau-Chuin

    Published 2015
    “…The growth of fire is detected using sobel edge detection. Finally a colour based segmentation technique was applied based on the results from the first technique and second technique to identify the region of interest (ROI) of the fire. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Hybrid anti-islanding algorithm for utility interconnection of distributed generation by Abdolrasol, M.G.M., Mekhilef, Saad

    Published 2009
    “…This algorithm is based on two detection schemes; namely active and passive. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Detecting resource consumption attack over MANET using an artificial immune algorithm by Abdelhaq, Maha, Hassan, Rosilah, Ismail, Mahamod, Israf Ali, Daud Ahmad

    Published 2011
    “…The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Performance study of the coexistence of Wireless Sensor Networks (WSN) and Wireless Local Area Networks (WLAN) / Muhammad Adib Haron … [et al.] by Haron, Muhammad Adib, Jusoh, Mohamad Huzaimy, Abdul Aziz, Noor Hafizah, W. Muhamad, Wan Norsyafizan

    Published 2008
    “…To implement WSN integrated with cognitive radio techno 10gy, a new algorithm that provides access mechanism is needed to interactively working with sensor nodes hardware. …”
    Get full text
    Get full text
    Research Reports
  19. 19

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis