Search Results - (( using function sensor algorithm ) OR ( data verification using algorithm ))
Search alternatives:
- verification using »
- data verification »
- sensor algorithm »
- using algorithm »
- using function »
-
1
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025“…The proposed system is developed using a Raspberry Pi 3 Home Server (RHS) driven by the Support Vector Machine (SVM) algorithm. …”
Article -
2
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
3
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
4
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
Get full text
Get full text
Thesis -
5
Provisioning an energy efficient with maximum coverage WSN through biological inspired sensor node placement
Published 2023Conference Paper -
6
Energy efficient sensor nodes placement using Territorial Predator Scent Marking Algorithm (TPSMA)
Published 2023“…The TPSMA deployed in this paper uses the maximum coverage ratio as the objective function. …”
Conference paper -
7
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Sensor Node Placement in Wireless Sensor Network Using Multi-objective Territorial Predator Scent Marking Algorithm
Published 2023“…The algorithm uses the maximum coverage and minimum energy consumption objective functions with subject to full connectivity. …”
Article -
9
A centralized localization algorithm for prolonging the lifetime of wireless sensor networks using particle swarm optimization in the existence of obstacles
Published 2017“…Particle Swarm Optimization has been used in the proposed algorithm to minimize the fitness function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun
Published 2019“…Based on the findings, a multi-sensor data correlation algorithm is developed. The algorithm is validated using real time radar and ADS-B data from Department of Civil Aviation Malaysia (CAAM). …”
Get full text
Get full text
Get full text
Thesis -
11
Improved static and dynamic FBG sensor system for real-time monitoring of composite structures
Published 2017“…Thus, the designation of this research study is to improve the current FBG based real-time monitoring system with the use of certain functions and algorithms, that are the instant mesh-grid function, voltage normalization algorithm, CC-LSL algorithm, and FFT function. …”
Get full text
Get full text
Thesis -
12
A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network
Published 2024“…Conclusion: The proposed algorithm that utilized NMM is more functional to enhance the precision of localization because of particular characteristics that are the flexible implementation of NMM and the free cost of using the RSSI technique.…”
Get full text
Get full text
Get full text
Get full text
Article -
13
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2011Get full text
Article -
14
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
15
WSN sensor node placement approach using Territorial Predator Scent Marking Algorithm (TPSMA)
Published 2023“…The TPSMA deployed in this paper uses the minimum uncovered area as the objective function. …”
Conference paper -
16
A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli
Published 2016“…In view of this, current tactile sensors cannot be used in endoscopic inspection applications. …”
Get full text
Get full text
Thesis -
17
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
18
Analysis of energy consumption in a wireless sensor network using fuzzy memberships function
Published 2020“…The use of sensors in every application as well as in today's life has become a huge demand. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Signature verification system using support vector machine
Published 2009“…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
Get full text
Get full text
Conference or Workshop Item -
20
Multi-objective biological mimicry optimization algorithm for WSN sensor node placement
Published 2023Conference Paper
