Search Results - (( data selection path algorithm ) OR ( variable detection sensor algorithm ))
Search alternatives:
- variable detection »
- detection sensor »
- sensor algorithm »
- data selection »
- selection path »
- path algorithm »
-
1
Automated path testing using the negative selection algorithm
Published 2017“…Negative selection algorithm (NSA) has been used in this paper to generate test data for path testing automatically. …”
Get full text
Get full text
Indexed Article -
2
Observer-based fault detection with fuzzy variable gains and its application to industrial servo system
Published 2020“…Also, a scoring algorithm has been implemented, to evaluate the classification ability of the algorithm and the early fault detection ability. …”
Get full text
Get full text
Get full text
Article -
3
Deforestation detection in Kinabalu Area, Sabah, Malaysia by using multi-sensor remote sensing approach
Published 2004“…This paper examines use of multi-sensor remote sensing approach for deforestation detection in the tropics. …”
Get full text
Get full text
Get full text
Article -
4
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
5
-
6
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
7
Cluster head selection using fuzzy logic and chaotic based genetic algorithm in wireless sensor network
Published 2013“…Wireless sensor networks (WSNs) are composed of hundreds or thousands of sensor nodes in order to detect and transmit information from its surrounding environment. …”
Get full text
Get full text
Article -
8
Modelling and analysis of sensor fault tolerant control using behavioral approach to systems theory
Published 2015“…State observers are then implemented as the fault detection method in which the discrepancies between the measured values by the sensors and the values of the model are expressed as residuals. …”
Get full text
Get full text
Get full text
Thesis -
9
An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network
Published 2019“…When this happens, the sensor node cannot receive and send the data until the energy is renewed. To reduce WSN energy consumption, the process of selecting a path to the destination is very important. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Such an in-band probing algorithm reduces measurement overhead on the selected overlay path. …”
Get full text
Get full text
Thesis -
11
DESIGN OF SMART TRAFFIC LIGHT SYSTEM BASED ON INTERNET OF THINGS
Published 2018“…Density of the traffic is calculated by the algorithm that have various variables. This project will use Arduino as it microcontroller and the ultrasonic is used to detect the congestion. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
12
Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria
Published 2018“…Dijkstra’s Algorithm is a shortest path algorithm that considers a single criterion only. …”
Get full text
Get full text
Get full text
Article -
13
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…This is further worsen by the use of single sensors modality and machine learning algorithms. …”
Get full text
Get full text
Get full text
Thesis -
14
Faulty sensor detection mechanism using multi-variate sensors in IoT
Published 2019“…Because of this, we proposed two methods for Faulty Sensor Detection and Identification mechanism based on multi-variate sensors for Smart Parking System and smart agriculture. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Multi agent quality of service routing based on scheme ant colony optimization algorithm
Published 2014“…This study also introduces a new probe-based procedure for discovery and setup QoS path for real-time traffic. The proposed scheme has been simulated by OMNET++ and compared with standard AntNet and two well-known standard QoS routings; Widest Shortest Path (WSP) algorithm and Shortest Widest Path (SWP) algorithm. …”
Get full text
Get full text
Thesis -
16
Predetermined path of mobile data gathering in wireless sensor networks based on network layout
Published 2014“…Thus, within each of these divided areas, the multi-hop collection is deployed as a sub-set to the main collection. The ME will select a centroid point between two sub-polling points, subsequently selecting common turning points as the core of the basis of the tour path. …”
Get full text
Get full text
Article -
17
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
18
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The system is then used in path prediction mode for reconstructing the missing parts of the trajectory when actual positioning data is unavailable. …”
Get full text
Get full text
Thesis -
19
Gas Identi cation by Using a Cluster-k-Nearest-Neighbor
Published 2009“…Among the most serious limitations facing the success of future consumer gas identification systems are the drift problem and the real-time detection due to the slow response of most of todays gas sensors. …”
Get full text
Get full text
Article -
20
Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET
Published 2022“…This scheme selects genuine node for routing path production, by using the node reward with dependence level estimating algorithm to compute every node trust level and resource range, to disconnect higher trust level node and lower trust level node; higher trust level node is a genuine node which performs secure communication. …”
Get full text
Get full text
Article
