Search Results - (( group evaluation sensor algorithm ) OR ( pattern detection path algorithm ))

Refine Results
  1. 1

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
    Get full text
    Thesis
  2. 2

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Evoluation strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…Generally, CB uses a group of distributed wireless sensor nodes, which collectively transmit a common message with different proper weights to an intended location. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Evolution strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…Generally, CB uses a group of distributed wireless sensor nodes, which collectively transmit a common message with different proper weights to an intended location. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    The impact of clustering on the average path length in wireless sensor networks by Aziz, A.A., Şekercioğlu, Y. A.

    Published 2015
    “…Clustering algorithms have been widely used in wireless sensor networks for virtual backbone construction. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Detection of tube defect using the autoregressive algorithm by Abd Halim, Zakiah, Jamaludin, Nordin, Junaidi, Syarif, Syed Yusainee, Syed Yahya

    Published 2015
    “…The variation in stress wave propagation was captured by a high frequency sensor. Stress wave signals from four tubes with artificial defects of different depths and one reference tube were classified using the autoregressive (AR) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Optimized range-free localization scheme using autonomous groups particles swarm optimization for anisotropic wireless sensor networks by Han, Fengrong, Izzeldin, Ibrahim Mohamed Abdelaziz, Kamarul Hawari, Ghazali, Zhao, Yue, Li, Ning

    Published 2023
    “…Location information is a required concern for localization-based service application in the field of wireless sensor networks (WSNs). Distance Vector-Hop (DV-Hop) algorithm as the most typical range-free localization scheme is more suitable for large-scaled WSNs. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Machine Learning Based Detection for Compromised Accounts on Social Media Networks by K., Swapna, M., Rithika, K., Rukmini, S., Swachitha, Y., Komali

    Published 2025
    “…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Development of high speed booth multiplier with optimized stuck-at fault implementation by Mohammed Khalid, Muhammad Nazir, Wan Hasan, Wan Zuha, Sulaiman, Nasri, Wagiran, Rahman

    Published 2002
    “…Deterministic technique will be used to detect failure circuit base on test pattern generation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16
  17. 17
  18. 18

    Configuration and analysis of piezoelectric-based in socket sensory system for transfemoral prosthetic Gait detection / Farahiyah Jasni by Farahiyah , Jasni

    Published 2018
    “…The performance of the proposed sensory system was evaluated by checking the accuracy of the pattern recognition algorithm in detecting the gait phases at different speeds of normal walking. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Efficient node cooperation stimulation mechanism in wireless multihop networks by Samian, Normalia

    Published 2017
    “…This scenario may be worsened by false accusation issues induced by group of colluding nodes which might cheat in evaluating node behaviour during global/second-hand observation process, for their own communication gains in the network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20