Search Results - (( data virtualization path algorithm ) OR ( variable teaching based algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi by Ujang, Muhamad Uznir

    Published 2008
    “…Therefore, it is the aim of this study to conduct a research about the Dijsktra’s algorithm implementation for shortest path calculation in 3D environment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…The multi-criterion energyefficient routing mechanism uses the ACO algorithm, inspired by ants' foraging behaviour. In Bluetooth M-LPNWSN systems, virtual ants explore paths based on signal robustness, distances, and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Design and implementation of MD5 hash function algorithm using verilog HDL by Shamsiah, Suhaili, Niam, Cleopatra Chundang, Zainah, Md Zain, Norhuzaimin, Julai

    Published 2022
    “…The architecture includes MD5 padding block, data path, and a controller. A general concept and implementation of the MD5 hash function is described. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL by Shamsiah, Suhaili, Cleopatra Chundang, Niam, Zainah, Md. Zain, Norhuzaimin, Julai

    Published 2020
    “…The architecture includes MD5 padding block, data path, and a controller. A general concept and implementation of the MD5 hash function is described. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Intruder localization wireless sensor network radar design with virtual reference tags by Abdullah, Hadi

    Published 2014
    “…This research designs a WSN (Wireless Sensor Network) algorithm for human intruder localization and path detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancing wind power forecasting accuracy with hybrid deep learning and teaching-learning-based optimization by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2024
    “…This paper presents an innovative approach that combines deep learning (DL) with Teaching-Learning-Based Optimization (TLBO) to predict wind power output accurately. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
    Get full text
    Get full text
    Thesis
  10. 10

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…The fast rise in data traffic and the vast range of services and applications accessible in 5G networks must be addressed effectively. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancing understanding of programming concepts through physical games by Raja Yusof, Raja Jamilah, Habib, Ahsan

    Published 2017
    “…The objective of our teaching approach is to introduce playing physical games using learner's body movement) in contrast to purely computer-based or board games as a tool to teach programming related subjects. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    End to end performance analysis over IP RAN network / Armi Shahran Mohamad by Mohamad, Armi Shahran

    Published 2011
    “…Due to that functionality, ATM makes a good choice for a network that must handle both traditional high-speed data (e.g. File transfer), and real time, low latency content such as voice and video. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…The scheme showed better data delivery and lower average-end-to-end delay with good flooding efficiency. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Permodelan Rangkaian Neural Buatan Untuk Penilaian Kendiri Teknologi Maklumat Guru Pelatih by Hashim, Asman

    Published 2001
    “…Artificial Neural Network is one of the branches of Artificial Intelligence which is utilized for the purpose of classification and prediction based on data in hand. The purpose of the study is to develop a web-based self assessment information system that can be used to obtain a model for prediction of information technology competency among teacher trainees in teaching institutes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Technical efficiency performance of Malaysian public research universities: Fuzzy data envelopment analysis / Saber Abdelall Mohamed Ahmed by Saber Abdelall, Mohamed Ahmed

    Published 2023
    “…With the growing importance for universities to achieve higher international ranking, that this study proposes the international QS world ranking indicators as the output variables, namely: Teaching Reputation, Research Reputation, and the citations percentage ratio. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17