Search Results - (( using factor method algorithm ) OR ( things application testing algorithm ))
Search alternatives:
- application testing »
- things application »
- testing algorithm »
- method algorithm »
- using factor »
-
1
Optimal sizing and location of distributed generation for power loss minimization using bee colony algorithm
Published 2023“…Therefore, a method which is Artificial Bee Colony (ABC) algorithm is proposed in this project for the optimal location and size of DG used in minimizing power losses and improve voltage profile. …”
text::Final Year Project -
2
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The algorithm use time division multiplexing algorithm together with hello message to allocate the neighbors and their energy level to find the best way to communicate and reduce packet drop, less signal interference and increase throughput. …”
Get full text
Get full text
Thesis -
3
Serious game intelligent transportation system based on internet of things
Published 2026“…Usability testing with 50 participants yielded an average system usability scale (SUS) score of 78.9, while expert evaluation using game design factor questionnaire (GDFQ) produced a mean of 4.19/5, both indicating high acceptance and positive user experience. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
6
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
7
Determination of a good indicator for estimated prime factor and its modification in Fermat’s Factoring Algorithm
Published 2021“…Fermat’s Factoring Algorithm (FFA) is an integer factorisation methods factoring the modulus N using exhaustive search. …”
Get full text
Get full text
Get full text
Article -
8
SENSORY EXPERT: DEVICE FOR SENSORY TEST
Published 2018Get full text
Get full text
Final Year Project -
9
Optimal load shedding in power system using back tracking search algorithm
Published 2024text::Final Year Project -
10
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
11
Optimal loading analysis with penalty factors for generators using brute force method
Published 2022“…This paper reports the optimal loading analysis method using the Brute Force method with and without considering the penalty factor of power line loss. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
LoRaWAN-based hybrid internet of wearable things system implementation for smart healthcare
Published 2024“…This study introduces the design and development of an Internet of Wearable Things-based Hybrid Healthcare Monitoring System (IoWT-HHMS) for smart medical applications. …”
Get full text
Get full text
Get full text
Article -
13
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…Devices that use the internet of things for DNA sequence testing also require a high level of expertise in the application of public-key cryptography. …”
Get full text
Get full text
Get full text
Thesis -
14
Comparative study of methods for solving the Rubik’s Cube / Nur Syahirah Shuhaimi & Noor Fazlini Mustari
Published 2019“…Since the efficiency were factored by move and time of each method by several algorithms, the movement of each method of several algorithms will be determined the efficiency for solving the Rubik’s Cube. …”
Get full text
Get full text
Thesis -
15
-
16
An Improved Indoor Positioning Algorithm Based on RSSI-Trilateration Technique for Internet of Things (IOT)
Published 2023Conference Paper -
17
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
Published 2024thesis::master thesis -
18
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…Most Internet of Things (IoT) resources are exposed to security risks due to their essential functionality. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…Factor analysis using principle component analysis (PCA) with an orthogonal rotation method, varimax factor rotation have resulted in 4 out of 15 parameters namely area, mean elevation, Gravelius factor and shape factor. …”
Get full text
Get full text
Thesis -
20
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper
