Search Results - (( data replication sensor algorithm ) OR ( data virtualization path algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1
  2. 2

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3
  4. 4

    Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi by Ujang, Muhamad Uznir

    Published 2008
    “…Therefore, it is the aim of this study to conduct a research about the Dijsktra’s algorithm implementation for shortest path calculation in 3D environment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Data-driven multi-fault detection in pipelines utilizing frequency response function and artificial neural networks by Hussein, Hussein A. M, Abdul Rahim, Sharafiz, Mustapha, Faizal B., Krishnan, Prajindra S., Abdul Jalil, Nawal Aswan

    Published 2025
    “…The subsequent data processing stage involved the application of an ANN algorithm for pattern recognition to analyze and classify the acquired data, identifying patterns associated with the replicated fault conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…The multi-criterion energyefficient routing mechanism uses the ACO algorithm, inspired by ants' foraging behaviour. In Bluetooth M-LPNWSN systems, virtual ants explore paths based on signal robustness, distances, and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor by Terence Jerome Daim

    Published 2023
    “…The developed algorithms interpret raw IR-UWB radar sensor data and associate it with specific hand gestures, addressing the core objective of gesture recognition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Design and implementation of MD5 hash function algorithm using verilog HDL by Shamsiah, Suhaili, Niam, Cleopatra Chundang, Zainah, Md Zain, Norhuzaimin, Julai

    Published 2022
    “…The architecture includes MD5 padding block, data path, and a controller. A general concept and implementation of the MD5 hash function is described. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL by Shamsiah, Suhaili, Cleopatra Chundang, Niam, Zainah, Md. Zain, Norhuzaimin, Julai

    Published 2020
    “…The architecture includes MD5 padding block, data path, and a controller. A general concept and implementation of the MD5 hash function is described. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    An autonomous wheelchair speed control using fuzzy logic controller / Muhammad Ashraf Mohamad Ghazali by Mohamad Ghazali, Muhammad Ashraf

    Published 2025
    “…The hardware integration combines vibration sensor, DC motor with encoders and Arduino Uno microcontroller that supported by Python for real-time data processing, user interface visualization and data storage. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Intruder localization wireless sensor network radar design with virtual reference tags by Abdullah, Hadi

    Published 2014
    “…This research designs a WSN (Wireless Sensor Network) algorithm for human intruder localization and path detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
    Get full text
    Get full text
    Thesis
  15. 15

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…The fast rise in data traffic and the vast range of services and applications accessible in 5G networks must be addressed effectively. …”
    Get full text
    Get full text
    Thesis
  16. 16

    End to end performance analysis over IP RAN network / Armi Shahran Mohamad by Mohamad, Armi Shahran

    Published 2011
    “…Due to that functionality, ATM makes a good choice for a network that must handle both traditional high-speed data (e.g. File transfer), and real time, low latency content such as voice and video. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…The scheme showed better data delivery and lower average-end-to-end delay with good flooding efficiency. …”
    Get full text
    Get full text
    Get full text
    Thesis