Search Results - (( things application testing algorithm ) OR ( basic visualisation using algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Composing multi-relations association rules from crowdsourcing remuneration data by Siti Salwa Salleh, Nurhayati Zakaria, Norjansalika Janom, Syaripah Ruzaini Syed Aris, Noor Habibah Arshad

    Published 2022
    “…To gain a more understandable insight, the data relationship is visualised using an alluvial chart that manages to illustrate the flow. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Axis manipulation to solve Inverse Kinematics of Hyper-Redundant Robot in 3D Space by Annisa, Jamali, Sheldon Ijau, Winston

    Published 2022
    “…In this study, an axis manipulation using a geometrical approach is used. Initially, a general algorithm for a 2-m-link hyper-redundant robot in 3D is generated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
    Get full text
    Get full text
    Thesis
  9. 9

    LoRaWAN-based hybrid internet of wearable things system implementation for smart healthcare by Abdulmalek, Suliman, Abdul Nasir, Abd Ghafar, Jabbar, Waheb A.

    Published 2024
    “…This study introduces the design and development of an Internet of Wearable Things-based Hybrid Healthcare Monitoring System (IoWT-HHMS) for smart medical applications. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…Devices that use the internet of things for DNA sequence testing also require a high level of expertise in the application of public-key cryptography. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Internet of wearable things-based on lora and wi-fi healthcare monitoring system for medical applications by Suliman Abdulmalek, Hamood Ahmed

    Published 2024
    “…The system underwent thorough testing, showing stable and accurate readings for vital parameters. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System by Chiadighikaobi, Ikenna Rene

    Published 2024
    “…Besides, the Mann-Whitney U test statistically shows a significant difference in security and computation cost between the two algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Fog-cloud scheduling simulator for reinforcement learning algorithms by Al-Hashimi, Mustafa Ahmed Adnan, Rahiman, Amir Rizaan, Muhammed, Abdullah, Hamid, Nor Asilah Wati

    Published 2023
    “…Fog computing is a popular choice for Internet of Things (IoT) applications, such as electricity, health, transportation, smart cities, security, and more. …”
    Get full text
    Get full text
    Article