Search Results - (( developing box ((sensor algorithm) OR (path algorithm)) ) OR ( java implication rsa algorithm ))
Search alternatives:
- sensor algorithm »
- java implication »
- implication rsa »
- developing box »
- path algorithm »
- rsa algorithm »
-
1
Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review
Published 2025“…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
Get full text
Get full text
Get full text
Get full text
Article -
2
Repetitive mutations in genetic algorithm for software test data generations
Published 2022“…Genetic Algorithm (GA) has proven to be an important method in generating test data for automatic path coverage testing. …”
Get full text
Get full text
Thesis -
3
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
Published 2018“…The main core of advanced encryption standard is its non-liner component that is S-Box, which is also called substitution table. The S-Box provides confusion capabilities in algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score
Published 2021“…The purpose of this study is two folds such as the development of a statistically valid path model which considered the possible non-linear paths, mediators, and binary endogenous feature of CVDs status. …”
Get full text
Get full text
Thesis -
5
Design of an intelligent robotic donationbox a case study
Published 2011“…The design and development of an Intelligent Robotic Donation Box (IRDB) system as a typical final year project in Mechatronics engineering is presented in this paper. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Development of drift conversion algorithm for ISFET based pH sensor for continuous measurement system
Published 2018Get full text
Get full text
Research Report -
7
-
8
Development of an automated multidirectional pest sampling detection system using motorized sticky traps
Published 2021“…A square-shaped sticky box was designed, and an optical sensor was attached to a scalable arm. …”
Get full text
Get full text
Get full text
Article -
9
Novel algorithms of identifying types of Partial Discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…Two novel algorithms are presented in this wok namely ‘Simple Partial Discharge Identifier (SPDI) and Fundamental Partial Discharge Identifier (FPDI) were developed to overcome the PD identification shortcoming……”
Get full text
Get full text
Book Section -
10
Reconfigurable Stewart Platform for Spiral Contours
Published 2011“…The results obtained are to be validated for singularity-free path planning and attempt has to be made to estimate the computational efficiency of the algorithm. …”
Get full text
Get full text
Get full text
Citation Index Journal -
11
Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…Two novel algorithms are presented in this wok namely ‘Simple Partial Discharge Identifier (SPDI) and Fundamental-Partial Discharge Identifier (FPDI) were developed to overcome the PD identification shortcoming. …”
Get full text
Get full text
Thesis -
12
Design and Fabrication of Smart Home With Internet of Things Enabled Automation System
Published 2019“…A prototype called IoT@HoMe is developed with an algorithm to enable the monitoring of home conditions and automate the control of home appliances over the Internet anytime and anywhere. …”
Get full text
Get full text
Get full text
Article -
13
Modeling and forecasting of injected fuel flow using neural network
Published 2011Get full text
Working Paper -
14
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
Get full text
Get full text
Thesis
