Search Results - (( using function path algorithm ) OR ( based encryption sensor algorithm ))
Search alternatives:
- sensor algorithm »
- using function »
- path algorithm »
- function path »
-
1
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…At the time of writing this thesis, AAḃ algorithm still exists as a mathematical concept and proven in a mathematical based software. …”
Get full text
Get full text
Thesis -
3
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
4
A-star (A*) algorithm implementation for robotics path planning navigation
Published 2018“…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah
Published 1997“…The euler's path it using pseudo input and Heuristic algorithm to find the minimum interlace. …”
Get full text
Get full text
Thesis -
6
Cognitive map approach for mobility path optimization using multiple objectives genetic algorithm
Published 2023Conference Paper -
7
Hybrid path planning for indoor robot with Laplacian Behaviour-based control via four point-explicit group
Published 2014“…Consequently, the gradient of the potential functions would be used by the searching algorithm to generate path from starting to goal location. …”
Get full text
Get full text
Get full text
Article -
8
-
9
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
10
Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control
Published 2016“…However, this assumption may lead to inaccurate secondary path model. In this work, the modelling of acoustic path using FIR filters is incorporated for both algorithms for Wiener-Hammerstein structure. …”
Get full text
Get full text
Thesis -
11
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article -
12
The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment
Published 2016“…Significant research has been conducted on Unmanned Aerial Vehicle (UAV) path planning using evolutionary algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), and Biogeographic-Based Optimization (BBO). …”
Get full text
Get full text
Thesis -
13
Robotic indoor path planning using dijkstra's algorithm with multi-layer dictionaries
Published 2016“…The path computed using the classic Dijkstra's algorithm is the shortest; however, it may not be the most feasible. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
16
Implementing server-side federated learning in an edge-cloud framework for precision aquaculture
Published 2025“…Reviews include systems using IoT and AI-based models, along with analysis of different federated learning algorithms such as FedSGD, FedAvg, and FedProx, and privacypreserving methods such as DA, SA, HE and CKKS encryption. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Wi-fi fingerprint database construction using Chebyshev wavelet functions
Published 2015“…Next, the collected reference samples are used to construct area specific path-loss prediction function using Chebyshev wavelets. …”
Get full text
Get full text
Conference or Workshop Item -
18
An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network
Published 2022“…To address these issues, we have proposed a novel group theory (GT)-based binary spring search (BSS) algorithm which consists of a hybrid deep neural network approach. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Nonlinear FXLMS algorithm for active noise control systems with saturation nonlinearity
Published 2012“…In this paper, a new method to model the secondary path using the Hammerstein model structure and tangential hyperbolic function (THF) is proposed. …”
Get full text
Get full text
Get full text
Article -
20
Optimization of multi-holes drilling path using particle swarm optimization
Published 2022“…The objective function was set to minimise the total tool path distance. …”
Get full text
Get full text
Thesis
