Search Results - (( data selection sensor algorithm ) OR ( data detection path algorithm ))

Refine Results
  1. 1

    Energy-Aware Routing Hole Detection Algorithm in the Hierarchical Wireless Sensor Network by Najm Us, Sama, Kartinah, Zen, Atiq Ur, Rahman, Aziz Ud, Din

    Published 2019
    “…In this paper a novel energy efficient routing hole detection (EEHD) algorithm is presented, on the detection of routing hole, the periodic re-clustering is performed to avoid the long detour path. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    An Efficient Route Selection Based on AODV Algorithm for VANET by Nassir Sallom , Kadhim, Mohammed, Muamer N., Mazlina, Abdul Majid, Sinan Q., Mohamd

    Published 2016
    “…The employment of (VANET) assists to increase the data delivery by providing a second path to send an emergency message to the rescue services center (RSC) whenever an accident located at out of coverage area for GSM network. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    An Efficient Route Selection based on AODV Algorithm for VANET by Kadhim, Nassir, Mohammed, Muamer N., Mazlina, Abdul Majid, Mohamd, Sinan Q., Tao, Hai

    Published 2016
    “…The employment of (VANET) assists to increase the data delivery by providing a second path to send an emergency message to The Rescue Services Center (RSC) whenever an accident located at out of coverage area of GSM network. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A noble approach of ACO algorithm for WSN by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2018
    “…A noble approach of ant colony optimization (ACO) algorithm for discovering the optimum route in the WSNs for data transmission is proposed here for enhancement and optimization considering the issue of path selection to reach the nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Void avoidance opportunistic routing density rank based for underwater sensor networks by Ismail, Nasarudin

    Published 2021
    “…Currently, the Underwater Sensor Networks (UWSNs) is mainly an attractive area due to its technological ability to gather valuable data from underwater environments such as tsunami monitoring sensors, military tactical applications, and environmental monitoring. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Totally opportunistic routing algorithm for underwater wireless sensor network by Rahman, Ziaur

    Published 2019
    “…Whereas in NA-TORA, Expected Transmission Count (ETX) and residual energy of a node are considered for data transmission to ensure packet delivery. The suggested data forwarding algorithms are designed to abstain horizontal transmission, to lower end to end delay and improve throughput and energy efficiency. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Effect of LiDAR mounting parameters and speed on HDL graph SLAM-Based 3D mapping for autonomous vehicles by Law, Jia Seng, Muhammad Aizzat, Zakaria, Younus, Maryam, Yong, Ericsson, Ismayuzri, Ishak, Mohamad Heerwan, Peeie, Muhammad Izhar, Ishak

    Published 2025
    “…This study investigates the physical calibration of a LiDAR sensor mounted on a moving vehicle and its effect on 3D map generation using the HDL Graph SLAM algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Imaging of solid flow in a gravity flow rig using infra-red tomography by Md. Yunus, Mohd. Amri

    Published 2005
    “…The software development involves data acquisition system, sensor modeling, image algorithms, and programming for a tomographic display to provide solids flow information in pipeline such as concentration and velocity profiles. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…The existing infeasible path detection methods are restricted to extended finite state machine (EFSM) models with integer data type only. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    False path identification algorithm framework for nonseparable controller-data path circuits by Shaheen, Ateeq U. R., Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    False path identification algorithm framework for nonseparable controller-data path circuits by Shaheen, A.-U.-R., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
    Get full text
    Get full text
    Article
  12. 12

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
    Get full text
    Thesis
  13. 13

    Whale optimization algorithm based on tent chaotic map for feature selection in soft sensors by AlRijeb, Mothena Fakhri Shaker, Othman, Mohammad Lutfi, Ishak, Aris, Hassan, Mohd Khair, Albaker, Baraa Munqith

    Published 2025
    “…The soft sensor was designed using several stages, including data collection, preprocessing, clustering, feature selection, and classification. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Mobile data gathering algorithms for wireless sensor networks by Ghaleb, Mukhtar Mahmoud Yahya

    Published 2014
    “…The third proposed algorithm achieves an adaptive data gathering strategy. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Performance of various forecasting algorithms to reduce the number of transmitted packets by sensor node in wireless sensor networks by Husni, Muhammed Ihsan

    Published 2018
    “…Additionally, in terms of absolute error in the data at the sink, the EDCD1 algorithm shows the best performance with less average error at 2.2803 for all sensors compared to others algorithms.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din by Wan Din, Wan Isni Sofiah

    Published 2016
    “…Hence, this study proposes a new algorithm called Multi-Tier Protocol (MAP). MAP introduced clustering scheme to reduce the energy consumption of wireless sensor network in which, Fuzzy Logic used as tools to select the cluster head and multi-hop communication is used to route the data from the cluster head to the base station. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An energy based cluster head selection unequal clustering algorithm with dual sink (ECH-DUAL) for continuous monitoring applications in wireless sensor networks by Alagirisamy, Mukil, Chow, Chee Onn

    Published 2018
    “…In our algorithm, tentative cluster head is selected based on energy based timer, residual energy, node IDs and trust value. …”
    Get full text
    Get full text
    Article
  19. 19

    Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din by Wan Din, Wan Isni Sofiah

    Published 2017
    “…Hence, this study proposes a new algorithm called Multi-Tier Protocol (MAP). MAP introduced clustering scheme to reduce the energy consumption of wireless sensor network in which, Fuzzy Logic used as tools to select the cluster head and multi-hop communication is used to route the data from the cluster head to the base station. …”
    Get full text
    Get full text
    Book Section
  20. 20

    Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi by Nur Fadzilah, Mohamad Radzi

    Published 2013
    “…Then, a collision detection algorithm is developed to calculate the potential of collision in future. …”
    Get full text
    Get full text
    Thesis