Search Results - (( parameter evaluation path algorithm ) OR ( based encryption sensor algorithm ))
Search alternatives:
- parameter evaluation »
- sensor algorithm »
- evaluation path »
- path algorithm »
-
1
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…At the time of writing this thesis, AAḃ algorithm still exists as a mathematical concept and proven in a mathematical based software. …”
Get full text
Get full text
Thesis -
3
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
4
Evaluation of robot path planning algorithms in global static environments: genetic algorithm vs ant colony optimization algorithm / Nohaidda Sariff and Norlida Buniyamin
Published 2010“…Performances between both algorithms were compared and evaluated in terms of speed and number of iterations that each algorithm takes to find an optimal path within several selected environments. …”
Get full text
Get full text
Get full text
Article -
5
A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments
Published 2013“…Sampling-based motion planning is a class of randomized path planning algorithms with proven completeness. …”
Get full text
Get full text
Thesis -
6
Cognitive map approach for mobility path optimization using multiple objectives genetic algorithm
Published 2023Subjects:Conference Paper -
7
A multi-objective parametric algorithm for sensor-based navigation in uncharted terrains
Published 2023“…These parameters are designed carefully to cover different requirements of the path planner. …”
Article -
8
-
9
Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff
Published 2011“…Subsequently, both algorithms were applied to the test environments. Finally, the performances of both algorithms were analyzed and evaluated based on the required criteria. …”
Get full text
Get full text
Thesis -
10
An Experiment of Ant Algorithms : Case Study of Kota Kinabalu Central Town
Published 2005“…The objectives of this study are to explore and evaluate the Ant System (AS) algorithm and Ant Colony System (ACS) algorithm in finding shortest paths. …”
Get full text
Get full text
Get full text
Thesis -
11
Performance analysis of ZigBeePRO network using shortest path algorithm for Distributed Renewable Generation
Published 2021“…Due to this polarization effect, the brick-built type cabin at the DRG site is a consequence of a higher propagation path loss than the Iron (III)-made cabin. The other performance parameters, including network throughput, data loss, and ZigBeePRO collision, are also evaluated.…”
Get full text
Get full text
Article -
12
Implementing server-side federated learning in an edge-cloud framework for precision aquaculture
Published 2025“…Reviews include systems using IoT and AI-based models, along with analysis of different federated learning algorithms such as FedSGD, FedAvg, and FedProx, and privacypreserving methods such as DA, SA, HE and CKKS encryption. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network
Published 2022“…To address these issues, we have proposed a novel group theory (GT)-based binary spring search (BSS) algorithm which consists of a hybrid deep neural network approach. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
All-pass filtered x least mean square algorithm for narrowband active noise control
Published 2018“…The performance evaluation in terms of convergence speed of the proposed algorithm is validated with standard ANC without secondary path modelling. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…It calculates the appropriate adjustments for the control parameters such as selection and crossover rate. Possible attack paths are then identified and evaluated based on an attack graph representing the network under study. …”
Get full text
Get full text
Article -
16
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…It calculates the appropriate adjustments for the control parameters such as selection and crossover rate. Possible attack paths are then identified and evaluated based on an attack graph representing the network under study. …”
Get full text
Get full text
Article -
17
Transmission path optimization Based on Efficiency Communication System
Published 2022“…At the same time, the developed algorithm combines the relative position of the cluster and the base station to further improve the routing method of the sub-cluster head, Finally, the algorithm analyzes the influence of different parameters on the transmission path, and use the simulation experiments to evaluate the conclusions.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Real-Time Optimal Trajectory Correction (ROTC) for autonomous quadrotor / Noorfadzli Abdul Razak
Published 2018“…The algorithm works if the quadrotor undergoes a deviation, an admissible trajectory path is generated for the quadrotor rapidly return on the straight-line route. …”
Get full text
Get full text
Thesis -
19
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…While the result of FFT algorithm summarizes that the number of the common FFT peak location index for sensors on the same subject is significantly higher compared to the number of common feature for sensors on different subjects.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Workload performance evaluation of large spatial database for DSS based disaster management
Published 2017“…Data recorded in the shortest path analysis process reveals that the evaluation and the prediction on workload performance of shortest path analysis using Dijkstra algorithm has been well implemented. …”
Get full text
Get full text
Get full text
Get full text
Thesis
