Search Results - (( developing issues connection algorithm ) OR ( java optimization path algorithm ))

Refine Results
  1. 1

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network by Puteri Azwa, Ahmad

    Published 2014
    “…This random deployment causes issues such as coverage hole, overlapping and connectivity failure that contributes to the performance of coverage and connectivity of WSN. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Before incorporating the optimization methods, a sizing algorithm for large-scale GCPV systems was developed. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…Connectivity is a critical issue in WSNs, as the data collected needs to be sent to the base station or the processing centers. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Performance enhancement of AIMD algorithm for congestion avoidance and control by Jasem, Hayder Natiq

    Published 2011
    “…One major issue arose in 80s when routers got congested and the connections collapsed because they were pushed to their limits by the competing robots for connection. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…Thus, there is a room for further enhancement to develop a routing algorithm as to mitigate the drawbacks with the NCPR. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…In this paper we will explore the developments of some of the important routing algorithms, and a survey with different comparisons, those have been proposed for the partially connected underwater environments. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…In this paper we will explore the developments of some of the important routing algorithms, and a survey with different comparisons, those have been proposed for the partially connected underwater environments. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Four algorithms have been proposed and developed in this research. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimization grid scheduling with priority base and bees algorithm by Ahmed, Mohammed Shihab

    Published 2014
    “…The suggested procedure means that a newly developed algorithm can implement the schedule grid task while accounting for priorities and deadlines to decrease the completion time required for the tasks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system by Rana, M.M., Romlie, M.F., Abdullah, M.F., Uddin, M., Sarkar, M.R.

    Published 2021
    “…It can also ensure an economic and environment friendly system where the existing algorithms are limited to serve these. The proposed algorithm can mitigate the available power issues for hybrid PV-BESS connected system and it can also minimize the operating cost by dispatching the generation units optimally. …”
    Get full text
    Get full text
    Article
  16. 16

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Dual authentication for bluetooth connection by Saliou, Diallo Alhassane, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Development of automatic pest sampling and detection system for cash crops by Hadi, Mustafa Kareem

    Published 2019
    “…The process of insect detection and counting is starting with image acquisition, image preprocessing, and morphological operations. Connected components algorithm was implemented for insect detection and counting. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper