Search Results - (( developing box ((sensor algorithm) OR (path algorithm)) ) OR ( java implication rsa algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2025
    “…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Repetitive mutations in genetic algorithm for software test data generations by Kadhim, Mohammed Majid

    Published 2022
    “…Genetic Algorithm (GA) has proven to be an important method in generating test data for automatic path coverage testing. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant by Agarwal, Praveen, Singh, Amandeep, Kilicman, Adem

    Published 2018
    “…The main core of advanced encryption standard is its non-liner component that is S-Box, which is also called substitution table. The S-Box provides confusion capabilities in algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score by Mirza Rizwan, Sajid

    Published 2021
    “…The purpose of this study is two folds such as the development of a statistically valid path model which considered the possible non-linear paths, mediators, and binary endogenous feature of CVDs status. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Design of an intelligent robotic donationbox a case study by Salami, Momoh Jimoh Emiyoka, Aibinu, Abiodun Musa, OAP Kader Mohideen, Safinaz, Mansor, Siti Aisha

    Published 2011
    “…The design and development of an Intelligent Robotic Donation Box (IRDB) system as a typical final year project in Mechatronics engineering is presented in this paper. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7
  8. 8
  9. 9

    Novel algorithms of identifying types of Partial Discharges using electrical and non-contact methods / Mohammad Shukri Hapeez by Hapeez, Mohammad Shukri

    Published 2015
    “…Two novel algorithms are presented in this wok namely ‘Simple Partial Discharge Identifier (SPDI) and Fundamental Partial Discharge Identifier (FPDI) were developed to overcome the PD identification shortcoming……”
    Get full text
    Get full text
    Book Section
  10. 10

    Reconfigurable Stewart Platform for Spiral Contours by G. , Satheesh Kumar, T. , Nagarajan

    Published 2011
    “…The results obtained are to be validated for singularity-free path planning and attempt has to be made to estimate the computational efficiency of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  11. 11

    Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez by Hapeez, Mohammad Shukri

    Published 2015
    “…Two novel algorithms are presented in this wok namely ‘Simple Partial Discharge Identifier (SPDI) and Fundamental-Partial Discharge Identifier (FPDI) were developed to overcome the PD identification shortcoming. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Design and Fabrication of Smart Home With Internet of Things Enabled Automation System by Jabbar, Waheb A., Tee, Kok Kian, Roshahliza, M. Ramli, Siti Nabila, Zubir, Nurthaqifah, S. M. Zamrizaman, Balfaqih, Mohammed, Shepelev, Vladimir, Alharbi, Soltan

    Published 2019
    “…A prototype called IoT@HoMe is developed with an algorithm to enable the monitoring of home conditions and automate the control of home appliances over the Internet anytime and anywhere. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
    Get full text
    Get full text
    Thesis