Search Results - (( based application ((new algorithm) OR (_ algorithm)) ) OR ( iot application during algorithm ))

Refine Results
  1. 1

    Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN by Ibrahim, Nurul Saliha Amani

    Published 2022
    “…Unmanned aerial vehicles (UAV) have enormous potential in enabling new applications in various areas, ranging from communication, military, security, to traffic-monitoring applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Smart agriculture: precision farming through sensor-based crop monitoring and control system by Mohamad Hakhrani, Asyful Azhim, Abdul Hamid, Syamsul Bahrin

    Published 2024
    “…Subsequently, four distinct algorithms are trained with the collected dataset to ascertain the most optimal algorithm for predicting crop growth and harvesting time, resulting in the selection of the Random Forest Regression model, which attains the highest model score of 86%. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…These features resulted in faster runtime compared to the more established RS A asymmetric encryption scheme, making AAp a potential alternative for IoT security. At the time of writing this thesis, AAḃ algorithm still exists as a mathematical concept and proven in a mathematical based software. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Human presence detection system by Tai, Xi Yang

    Published 2024
    “…Overall, the project contributes valuable insights into the development of IoT-based human presence detection systems, paving the way for applications in occupancy monitoring and resource optimization.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Scheduling strategy of a cloud-based virtual energy storage system (VESS) for achieving energy saving by Lau, Sim Yee

    Published 2024
    “…The research explores a review of the literature on limitation of ESS, concepts of VESS, role of cloud computing and IoT in VESS as well as the control strategy algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11

    Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap by Masirap, Madzirin

    Published 2014
    “…This paper is mainly interested in near real-time wireless application with regards to Internet of Things (IoT). …”
    Get full text
    Get full text
    Article
  12. 12

    Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap by Masirap, Madzirin

    Published 2014
    “…This paper is mainly interested in near real-time wireless application with regards to Internet of Things (IoT). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Adaptive beamforming algorithm based on Simulated Kalman Filter by Kelvin Lazarus, Lazarus

    Published 2017
    “…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali by Hilyati Hanina, Zazali

    Published 2012
    “…The third algorithm describes the application of Decomposition Problem to the signing and verifying digital messages in ECC. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Propose a New Machine Learning Algorithm based on Cancer Diagnosis by Ali, Mohammed Hasan, Kohbalan, Moorthy, Anad, Mohammed Morad, Mohammed, Mohammed Abdulameer

    Published 2018
    “…In this review, we focus on the current status of machine learning applications in cancer research, also propose a new algorithm Fast Learning Network to work based on cancer research.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
    Get full text
    Get full text
    Thesis