Search Results - (( using function sensor algorithm ) OR ( risk estimation based algorithm ))

Refine Results
  1. 1

    Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score by Mirza Rizwan, Sajid

    Published 2021
    “…A novel methodology was used to compute simple heart risk scores called non-laboratory based heart risk score (NLHRS). …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Energy efficient sensor nodes placement using Territorial Predator Scent Marking Algorithm (TPSMA) by Abidin H.Z., Din N.M.

    Published 2023
    “…The TPSMA deployed in this paper uses the maximum coverage ratio as the objective function. …”
    Conference paper
  5. 5

    Sensor Node Placement in Wireless Sensor Network Using Multi-objective Territorial Predator Scent Marking Algorithm by Zainol Abidin H., Din N.M., Yassin I.M., Omar H.A., Radzi N.A.M., Sadon S.K.

    Published 2023
    “…The algorithm uses the maximum coverage and minimum energy consumption objective functions with subject to full connectivity. …”
    Article
  6. 6

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…The proposed HPSO algorithm aims to obtain the least number of computations with low degradation value in estimation accuracy. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun by Koh , Che Hun

    Published 2019
    “…Based on the findings, a multi-sensor data correlation algorithm is developed. The algorithm is validated using real time radar and ADS-B data from Department of Civil Aviation Malaysia (CAAM). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Improved static and dynamic FBG sensor system for real-time monitoring of composite structures by Vorathin, Epin

    Published 2017
    “…Thus, the designation of this research study is to improve the current FBG based real-time monitoring system with the use of certain functions and algorithms, that are the instant mesh-grid function, voltage normalization algorithm, CC-LSL algorithm, and FFT function. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network by Gumaida, Bassam, Abubakar, Adamu

    Published 2024
    “…Conclusion: The proposed algorithm that utilized NMM is more functional to enhance the precision of localization because of particular characteristics that are the flexible implementation of NMM and the free cost of using the RSSI technique.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data by Hamza, Abubakar

    Published 2023
    “…The finding reveals that the Weibull distribution is well-suited to describing the investment behaviour of the MPS based on the estimates via the SA algorithm. Therefore, purchasing shares in this sector is very attractive for a long-term investment period, but may have a high risk of committing it as a result of fluctuations in the mean and variance of the estimate. …”
    Get full text
    Get full text
    Thesis
  12. 12

    WSN sensor node placement approach using Territorial Predator Scent Marking Algorithm (TPSMA) by Abidin H.Z., Din N.M.

    Published 2023
    “…The TPSMA deployed in this paper uses the minimum uncovered area as the objective function. …”
    Conference paper
  13. 13

    A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli by Mohamed Rosli, Nurul Fathiah

    Published 2016
    “…In view of this, current tactile sensors cannot be used in endoscopic inspection applications. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Analysis of energy consumption in a wireless sensor network using fuzzy memberships function by Wan Isni Sofiah, Wan Din, Ramalingam, Mritha, Nuramera, Abdullah

    Published 2020
    “…The use of sensors in every application as well as in today's life has become a huge demand. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study by Hassan, Ali Abdul Hussian, Md Shah, Wahidah, Jabbar Mohammed, Ali Abdul, Othman, Mohd Fairuz Iskandar

    Published 2017
    “…So, the energy-efficient routing protocols are very necessary and considers vital task for sensors networks. Various approaches of clustering algorithms are used to optimize the energy of routing protocols. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    WSN sensor node placement approach based on multi-objective optimization by Abidin H.Z., Din N.M., Radzi N.A.M.

    Published 2023
    “…A sensor node placement algorithm that utilizes Multi-objective Territorial Predator Scent Marking Algorithm (MOTPSMA) is presented in this paper. …”
    Conference Paper
  18. 18

    Inertial sensor-based instrumented cane for real-time walking cane kinematics estimation by Fernandez, Ibai Gorordo, Ahmad, Siti Anom, Wada, Chikamune

    Published 2020
    “…Based on inertial sensor data, the proposed system estimates the kinematics (contact phase and orientation) of the cane. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Development of an early software project risk asssessment application using case-based reasoning / Ahmad Zaki Kamaruddin by Kamaruddin, Ahmad Zaki

    Published 2006
    “…It helps project manager to reduce the risk of incorrect estimation of project cost in software development. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Vault’s floor security sensor with RFID access using microcontroller: article / Mohd Firdouz Bahtiar by Bahtiar, Mohd Firdouz

    Published 2009
    “…The algorithm for the RFID access and the security sensor was commercial software to control the microcontroller and interfacing circuits.…”
    Get full text
    Get full text
    Article