Search Results - (( using function ((sensor algorithm) OR (based algorithm)) ) OR ( _ coding method algorithm ))
Search alternatives:
- sensor algorithm »
- method algorithm »
- using function »
- coding method »
- _ coding »
-
1
Analysis of Toothbrush Rig Parameter Estimation Using Different Model Orders in Real Coded Genetic Algorithm (RCGA)
Published 2024“…Real-coded genetic algorithm (RCGA) as a stochastic global search method was applied for optimization. …”
Article -
2
Analysis of toothbrush rig parameter estimation using different model orders in Real-Coded Genetic Algorithm (RCGA)
Published 2018“…The statistical analysis was used to evaluate the performance of the model based on the objective function which is the Mean Square Error (MSE). …”
Get full text
Article -
3
Bidirectional detection method using for hall effects sensors for water flow measurement system
Published 2014“…Numerous water flow measurement (WFM) systems have been reported such as Hall-Effect (HE) sensor based WFM systems, which also can be categorized into different types such as single HE sensor, two HE sensors and three HE sensors based WFM systems. …”
Get full text
Get full text
Thesis -
4
Genetic algorithm based network coding in wireless ad hoc networks
Published 2013“…Genetic algorithm based coding-aware routing (GACAR) is embedded in the wireless ad hoc network with network coding capabilities to search for coding opportunities for unicast sessions. …”
Get full text
Get full text
Get full text
Thesis -
5
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…From the data analysis using WEKA software, the production rules classifier (PART) is found to be the most accurate classification algorithm in classifying the emotion which yields the highest precision percentage of 99.6% compared to J48 (99.5%) and Naïve Bayes (96.2%). …”
Get full text
Get full text
Thesis -
6
A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network
Published 2024“…Conclusion: The proposed algorithm that utilized NMM is more functional to enhance the precision of localization because of particular characteristics that are the flexible implementation of NMM and the free cost of using the RSSI technique.…”
Get full text
Get full text
Get full text
Get full text
Article -
7
Provisioning an energy efficient with maximum coverage WSN through biological inspired sensor node placement
Published 2023Conference Paper -
8
Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study
Published 2017“…Also, the clustering approaches support the scalability of Wireless Sensor Networks. In this paper, numerous energy efficient routing algorithms for hierarchical routing protocol in Wireless Sensor Networks have been discussed based on the clustering approaches. …”
Get full text
Get full text
Get full text
Article -
9
Sensor Node Placement in Wireless Sensor Network Using Multi-objective Territorial Predator Scent Marking Algorithm
Published 2023“…The algorithm uses the maximum coverage and minimum energy consumption objective functions with subject to full connectivity. …”
Article -
10
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006“…The first stage of this project is the study of Blowfish algorithm and translates the method into VHDL code because VHDL has been commonly used as a design entry language for FPGA in digital design. …”
Get full text
Get full text
Monograph -
11
Comparative study of secant, Fixed point and Sixth section methods for solving root in nonlinear equation / Nik Syahrul Naim Abdul Rahman
Published 2017“…In this research, these methods are selected because it can be understand and has simple algorithm to use. …”
Get full text
Get full text
Thesis -
12
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…Furthermore, a combination of unfolding and pipelining can also increase the throughput of hash function algorithms.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
Get full text
Get full text
Research Report -
14
WSN sensor node placement approach based on multi-objective optimization
Published 2023“…A sensor node placement algorithm that utilizes Multi-objective Territorial Predator Scent Marking Algorithm (MOTPSMA) is presented in this paper. …”
Conference Paper -
15
Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun
Published 2019“…Based on the findings, a multi-sensor data correlation algorithm is developed. …”
Get full text
Get full text
Get full text
Thesis -
16
Web Camera Application For Motion Detection
Published 2003“…The conventional way is by using either active sensor or passive sensor. The new method to detect motion is "vision motion detection". …”
Get full text
Get full text
Thesis -
17
Optimization of coded signals based on wavelet neural network
Published 2015“…We performed evaluation using 13-bit, 35-bit and 69-bit Barker codes as signal codes to WNN. When compared with other existing methods, WNN yields better PSR, low Mean Square Error (MSE), less noise, range resolution ability and Doppler shift performance than the previous and some traditional algorithms like auto correlation function (ACF) algorithm.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
Get full text
Get full text
Thesis -
19
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Proceeding -
20
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Proceeding
