Search Results - (( storage optimization sensor algorithm ) OR ( parameter detection method algorithm ))
Search alternatives:
- storage optimization »
- optimization sensor »
- parameter detection »
- sensor algorithm »
- method algorithm »
-
1
Data Encryption-Enabled Cloud Cost Optimization and Energy Efficiency-Based Border Security Model
Published 2024Subjects:Article -
2
Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism
Published 2025Subjects:Conference paper -
3
Prolonging lifetime of wireless sensor networks with mobile base station using particle swarm optimization
Published 2011Get full text
Working Paper -
4
Enhancing wireless sensor network data collection through aerial unmanned vehicles
Published 2024“…This research sheds light on these algorithms' vital role in addressing the pressing challenges of data gathering and network performance optimization in wireless sensor networks…”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Human presence detection system
Published 2024“…Moreover, the project delves into the critical aspect of determining optimal delay intervals for sensor status checks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
7
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
10
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
11
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…While the result of FFT algorithm summarizes that the number of the common FFT peak location index for sensors on the same subject is significantly higher compared to the number of common feature for sensors on different subjects.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
13
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
SENSORY EXPERT: DEVICE FOR SENSORY TEST
Published 2018“…The data is then sent to a Gmail as a storage by developing algorithm in Wi-Fi module NodeMCU ESP8266. …”
Get full text
Get full text
Final Year Project -
15
Differential Search Optimized Random Forest Regression Algorithm for State of Charge Estimation in Electric Vehicle Batteries
Published 2023Conference Paper -
16
-
17
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
18
Performance Analysis of Routing Protocols in Wireless Sensor Networks
Published 2014“…WSNs are limited by energy, storage capability and power consumption. Therefore, it is important to consider these limitations while choosing routing protocols for WSN. …”
Get full text
Get full text
Final Year Project -
19
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
Get full text
Get full text
Get full text
Article -
20
Outlier detection in circular regression model using minimum spanning tree method
Published 2019“…The existence of outliers in a circular regression model can lead to many errors, for example in inferences and parameter estimations. Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
Get full text
Get full text
Conference or Workshop Item
