Search Results - (( data verification sensor algorithm ) OR ( parallel optimization path algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  6. 6

    Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS) by Alsaedi, Noor, Hashim, Fazirulhisyam, Sali, Aduwati, Rokhani, Fakhrul Zaman

    Published 2017
    “…It employs multi-level detection based on identity and position verification. Then, a trust algorithm is applied based on the energy of each sensor node. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Internet of Things-based Home Automation with Network Mapper and MQTT Protocol by Alam T., Rokonuzzaman M., Sarker S., Abadin A.F.M.Z., Debnath T., Hossain M.I.

    Published 2025
    “…The experiments demonstrate a fundamental edge operation with a latency of 2.45 ms (milliseconds), while NMAP integration ensures data security and device verification for sensor data storage. …”
    Article
  8. 8

    Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…Recent Society 5.0 efforts by the Government of Japan are aimed at establishing a sustainable human-centered society by combining new technologies such as sensor networks, edge computing, Internet of Things (IoT) ecosystems, artificial intelligence (AI), big data, and robotics. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Validation process for electrical charge tomography system using digital imaging technique by Isa, Mohd Daud, Rahmat, Mohd Fua'ad, Jusoff, Kamaruzaman, Raja Hussin, Tengku Ahmad Badrul Shah

    Published 2009
    “…Numerical analysis result based on data measured by sensor indicates that the algorithm is efficient to overcome the numerical instability. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A study on obstacle detection for IoT based automated guided vehicle (AGV) by Loh, Jit Hao, M. Nafis, O. Z.

    Published 2022
    “…In order to improve obstacle detection in the AGV prototype, Kalman Filtering (KF) algorithm is used in the signal filtering for the HC-SR04 Ultrasonic Sensor data acquisition. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Pile Capacity Checking Tool based on Distributed Fibre Optic Sensing for Instrumented Pile Load Test by Beddelee, A.A.A.M., Mohamad, H., Tee, B.P.

    Published 2023
    “…Experts are reconciling with different data processing algorithms to assess pile capacity (t-z curve) from the DOFS data and verify it, leading to a demand for standard practice. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Secure payment parking system (SPS) with Excel database software / Syed Luqman Putra Syed Putra Zainol Alam by Syed Putra Zainol Alam, Syed Luqman Putra

    Published 2024
    “…According to statistical data, the number of vehicles on the roads has been steadily increasing, leading to overcrowded parking lots and time-consuming parking procedures. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
    Get full text
    Get full text
    Thesis
  18. 18

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Fusion model of unmanned aerial vehicle-based digital elevation model for accuracy improvement mapping by Isola, Ajibola Ismaila

    Published 2020
    “…The photos were processed using Agisoft algorithm. In the end, seven DEMs were exported in tiff file format. …”
    Get full text
    Get full text
    Thesis