Search Results - (( filing implementation force algorithm ) OR ( java optimization sensor algorithm ))
Search alternatives:
- filing implementation »
- implementation force »
- optimization sensor »
- java optimization »
- sensor algorithm »
- force algorithm »
-
1
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…Wireless sensor networks operate through commonly self-organized sensor nodes to transfer data in a multi-hop approach to a central sink. …”
Get full text
Get full text
Thesis -
2
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…Wireless sensor networks operate through commonly self-organized sensor nodes to transfer data in a multi-hop approach to a central sink. …”
Get full text
Get full text
Get full text
Article -
3
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…But committing to memory such strong passwords can prove to be quite a daunting task thus forcing users to resort to writing them down on pieces of papers or even storing them onto a computer file. …”
Get full text
Get full text
Get full text
Article -
4
Potential field methods and their inherent approaches for path planning
Published 2016“…Two type of forces involved in potential field method; attractive force generated by goals and repulsive force generated by obstacles. …”
Get full text
Get full text
Article -
5
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
The quadriceps muscle of knee joint modelling using neural network approach: Part 2
Published 2017“…— Artificial neural network has been implemented in many filed, and one of the most famous estimators. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Also, user attributes are stored in the block storage using an InterPlanetary File System (IPFS) protocol to eliminate the concept of centralizing storage. …”
Get full text
Get full text
Thesis
