Search Results - (( _ application using algorithm ) OR ( things applications out algorithm ))
Search alternatives:
- things applications »
- applications out »
- using algorithm »
- out algorithm »
-
1
A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
Published 2024thesis::master thesis -
3
-
4
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…This research implements the SHA-3 in ways such that all the step mapping algorithms are logically combined to only use the input lanes of the state array to eliminate the intermediate logics and reduces the area size. …”
Get full text
Get full text
Thesis -
5
Enhancement of rules-application-order (RAO) stemming algorithm based on the first character of Malay word / Edatul Muliana Ghazalli
Published 2005“…The resuhs of experiment B, which is enhance project is better than experiment A, which is Rules-Application-Order (RAO) by Fatimah (1995) because that algorithm has successfully stemmed all word begin with alphabet "A" until "Z" that extracted fi-om Quran documents.…”
Get full text
Get full text
Thesis -
6
Obstacle Detection And Avoidance System
Published 2018“…Current technology trend is moving towards automation and people need things to be done automatically. The obstacle detection and avoidance system is being researched to study its application in automated machine. …”
Get full text
Get full text
Monograph -
7
Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device
Published 2021“…This research will investigate the application of the Symbolic Aggregate Approximation (SAX) algorithm on top of known supervised machine learning techniques to perform EEG signal classification. …”
Get full text
Thesis -
8
Designing an integrated AIOT system for tracking class attendance
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
10
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…Our approach is, therefore, highly effective and efficient, with the potential to be used in real-world network security applications.…”
Get full text
Get full text
Article -
11
Intuitive content management system via manipulation and duplication with if-else rules classification
Published 2018“…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
Get full text
Get full text
Thesis -
12
Smart and energy aware routing for the internet of mobile things
Published 2021Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei
Published 2018“…Network traffic is growing exponentially due to the ever-increasing number of users, datacentres, Internet of Things (IoT) devices, and cloud-like applications/services. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities
Published 2021“…This work proposes a new authentication scheme for agriculture professionals based on a multi-gateway communication model using a fuzzy extractor algorithm to support the Society 5.0 environment. …”
Get full text
Get full text
Get full text
Article -
16
Design and analysis of microstrip antenna using negative index metamaterial approach
Published 2012“…Parameters retrieval algorithm and full-wave simulation of prism-shaped structure were carried out to validate the negative index of refraction property of the proposed NIM structures. …”
Get full text
Get full text
Thesis -
17
-
18
Hybrid metaheuristics for QOS-aware service composition / Hadi Naghavipour
Published 2022“…An absolute majority of base algorithms for this problem were nature-inspired and population-based metaheuristics extended to complementary methods in hybrid solutions. …”
Get full text
Get full text
Get full text
Thesis -
19
HIGH DENSITY DEEP LEARNING-LITE WITH INTEL OPENVINO™
Published 2018Get full text
Get full text
Final Year Project -
20
Schelkunoff array synthesis methods using adaptive-iterative algorithm
Published 2003“…By the co-emergence of these algorithms, a better performance and wider application are hoped to be achieved since each of these algorithms has its own advantages respectively. …”
Get full text
Get full text
Get full text
Thesis
