Search Results - (( data application testing algorithm ) OR ( data virtualization path algorithm ))
Search alternatives:
- application testing »
- data virtualization »
- virtualization path »
- testing algorithm »
- data application »
- path algorithm »
-
1
Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi
Published 2008“…Therefore, it is the aim of this study to conduct a research about the Dijsktra’s algorithm implementation for shortest path calculation in 3D environment. …”
Get full text
Get full text
Get full text
Thesis -
2
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…The multi-criterion energyefficient routing mechanism uses the ACO algorithm, inspired by ants' foraging behaviour. In Bluetooth M-LPNWSN systems, virtual ants explore paths based on signal robustness, distances, and energy consumption. …”
Get full text
Get full text
Get full text
Thesis -
4
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…The architecture includes MD5 padding block, data path, and a controller. A general concept and implementation of the MD5 hash function is described. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…The architecture includes MD5 padding block, data path, and a controller. A general concept and implementation of the MD5 hash function is described. …”
Get full text
Get full text
Get full text
Article -
6
Vehicle route tracking system based on vehicle registration number recognition using template matching algorithm
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Intruder localization wireless sensor network radar design with virtual reference tags
Published 2014“…This research designs a WSN (Wireless Sensor Network) algorithm for human intruder localization and path detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
Get full text
Get full text
Thesis -
9
-
10
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
11
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…The fast rise in data traffic and the vast range of services and applications accessible in 5G networks must be addressed effectively. …”
Get full text
Get full text
Thesis -
12
-
13
Enhancement of bearing defect diagnosis via genetic algorithm optimized feature selection
Published 2015“…However the average classification accuracy of 84.74% on the unseen test data did not achieve the acceptable average success rate of 90% in this application. …”
Get full text
Get full text
Get full text
Thesis -
14
ANALYSIS AND INTERPRETATION OF PRESSURE TRANSIENT TEST DATA BY RECENT ROBUST DECONVOLUTION METHODS
Published 2013Get full text
Get full text
Final Year Project -
15
Fault detection with optimum March test algorithm
Published 2013Get full text
Get full text
Get full text
Article -
16
Randomness Tests On Nine Data Categories Of RECTANGLE Using NIST Statistical Test Suite
Published 2024Article -
17
Diabetes prediction system using clonal selection algorithm / Nor Aishah Mustapa
Published 2012“…The data included in the system is a tested and accurate data. …”
Get full text
Get full text
Thesis -
18
Parallelization of noise reduction algorithm for seismic data on a beowulf cluster
Published 2010Get full text
Get full text
Citation Index Journal -
19
Steganography algorithm to hide secret message inside an image
Published 2011Get full text
Get full text
Article -
20
Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm
Published 2020“…The k-NN algorithm is one of the most renowned ML algorithms widely used in the area of data classification research. …”
Get full text
Get full text
Article
