Search Results - (( data replications sensor algorithm ) OR ( leave application tree algorithm ))

Refine Results
  1. 1
  2. 2

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Classification model for hotspot occurrences using spatial decision tree algorithm by Sitanggang, Imas Sukaesih, Yaakob, Razali, Mustapha, Norwati, Nuruddin, Ahmad Ainuddin

    Published 2013
    “…This study describes the application of data mining technique namely decision tree on forest fires data. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An efficient scalable batch-rekeying scheme for secure multicast communication using multiple logical key trees by Zakaria, Omar, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina

    Published 2014
    “…Instead of using only a single key tree multiple key trees are used and at the end of each batch time the algorithm decides which tree will be used to update the keys. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Performance analysis of machine learning algorithms for classification of infection severity levels on rubber leaves by Mat Lazim, Siti Saripa Rabiah, Sulaiman, Zulkefly, Mat Nawi, Nazmi, Mohd Mustafah, Anas

    Published 2023
    “…At the early infection stage, it is very difficult to diagnose the disease because infected trees do not exhibit any symptoms. Thus, this study was carried out to investigate the potential application of spectroscopic technology and machine learning algorithms to classify severity level of infected trees at early stage based on spectral data. …”
    Get full text
    Get full text
    Get full text
    Book Section
  11. 11
  12. 12

    Data-driven multi-fault detection in pipelines utilizing frequency response function and artificial neural networks by Hussein, Hussein A. M, Abdul Rahim, Sharafiz, Mustapha, Faizal B., Krishnan, Prajindra S., Abdul Jalil, Nawal Aswan

    Published 2025
    “…The subsequent data processing stage involved the application of an ANN algorithm for pattern recognition to analyze and classify the acquired data, identifying patterns associated with the replicated fault conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Classification model for hotspot occurrences using a decision tree method by Sitanggang, Imas Sukaesih, Ismail, Mohd Hasmadi

    Published 2011
    “…This work demonstrates the application of a decision tree algorithm, namely the C4.5 algorithm, to develop a classification model from forest fire data in the Rokan Hilir district, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor by Terence Jerome Daim

    Published 2023
    “…The developed algorithms interpret raw IR-UWB radar sensor data and associate it with specific hand gestures, addressing the core objective of gesture recognition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Hotspot occurences classififcation using decision tree method: case study in the Rokan Hilir, Riau Province, Indonesia by Imas, Sukaesih Sitanggang, Ismail, Mohd Hasmadi

    Published 2010
    “…The results were a decision tree which contains 18 leaves and 26 nodes with accuracy about 63.17%. …”
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    An autonomous wheelchair speed control using fuzzy logic controller / Muhammad Ashraf Mohamad Ghazali by Mohamad Ghazali, Muhammad Ashraf

    Published 2025
    “…The hardware integration combines vibration sensor, DC motor with encoders and Arduino Uno microcontroller that supported by Python for real-time data processing, user interface visualization and data storage. …”
    Get full text
    Get full text
    Thesis
  20. 20