Search Results - (( storage optimization sensor algorithm ) OR ( using function a algorithm ))

Refine Results
  1. 1

    An autonomous wheelchair speed control using fuzzy logic controller / Muhammad Ashraf Mohamad Ghazali by Mohamad Ghazali, Muhammad Ashraf

    Published 2025
    “…The controller is designed to receive two inputs: one from a vibration sensing mechanism that uses a piezoelectric sensor, and another from a DC motor with an encoder to provide speed feedback. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5

    Enhancing wireless sensor network data collection through aerial unmanned vehicles by Ahmed, Amjed Abbas, Ali Alheeti, Khattab M., Najim, Ali Hamza, Satar, Nurhizam Safie Mohd, Aliesawi, Salah A., Hassan Abdalla Hashim, Aisha

    Published 2024
    “…This research sheds light on these algorithms' vital role in addressing the pressing challenges of data gathering and network performance optimization in wireless sensor networks…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Human presence detection system by Tai, Xi Yang

    Published 2024
    “…Moreover, the project delves into the critical aspect of determining optimal delay intervals for sensor status checks. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network by Ramli, Sofia Najwa

    Published 2016
    “…While the result of FFT algorithm summarizes that the number of the common FFT peak location index for sensors on the same subject is significantly higher compared to the number of common feature for sensors on different subjects.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    SENSORY EXPERT: DEVICE FOR SENSORY TEST by MOHD ADZMI, MOHD DANIAL AIMAN

    Published 2018
    “…The data is then sent to a Gmail as a storage by developing algorithm in Wi-Fi module NodeMCU ESP8266. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11
  12. 12

    Performance Analysis of Routing Protocols in Wireless Sensor Networks by Htet, Kyaw Min

    Published 2014
    “…WSNs are limited by energy, storage capability and power consumption. Therefore, it is important to consider these limitations while choosing routing protocols for WSN. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14

    A secure data authentication in wireless body area network for health monitoring using electrocardiogram-based key agreement by Ramli, Sofia Najwa, Ahmad, Rabiah, Abdollah, Mohd Faizal

    Published 2016
    “…Due to the uniqueness and the permanence property of ECG signal, the proposed model is developed to achieve optimal security performance and required lightweight manners of to the resource-limited biomedical sensors. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A secure data authentication in wireless body area network for health monitoring using electrocardiogram-based key agreement by Ramli, Sofia Najwa, Ahmad, Rabiah, Abdollah, Mohd Faizal

    Published 2016
    “…Due to the uniqueness and the permanence property of ECG signal, the proposed model is developed to achieve optimal security performance and required lightweight manners of to the resource-limited biomedical sensors. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    3D Openjpeg2000 With Integer KLT by Mamat, Shahrul Azmam

    Published 2018
    “…The amount of acquired data of the hyperspectral image greatly increased since the spectral and spatial resolution of sensors which monitoring Earth terrains increase as well. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…We have evaluated the FaaSBid model and the proposed algorithms and pricing model by comparing with a number of existing models and algorithms using real-world datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20