Search Results - (( wave application ((a algorithm) OR (_ algorithm)) ) OR ( iot applications system algorithm ))

Refine Results
  1. 1

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…Routing algorithms must ensure the data transmission in an efficient way, having proper knowledge of the IoT system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…The Random Decision Forest and the Support Vector Machine are the machine learning algorithms employed for this task. The accuracy of trend prediction above 70 proves the relevancy of EW patterns on stock market data as well as the validity of the algorithm as a tool for detection of such patterns. …”
    Get full text
    Get full text
    Article
  3. 3

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…The Random Decision Forest and the Support Vector Machine are the machine learning algorithms employed for this task. The accuracy of trend prediction above 70 proves the relevancy of EW patterns on stock market data as well as the validity of the algorithm as a tool for detection of such patterns. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy by Madzzaini, Nur Sofea Eleena

    Published 2017
    “…In addition, CORDIC algorithm has a low usage of memory space compared to Look Up table (LUT) technique. …”
    Get full text
    Get full text
    Student Project
  6. 6
  7. 7

    Market prices trend forecasting supported by Elliott Wave's theory by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2017
    “…The trend prediction is supported by application of recognized Elliot waves which was performed by custom developed algorithm based on available knowledge about the patterns. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks by Al-Mekhlafi, Zeyad Ghaleb Aqlan, Mohd Hanapi, Zurina, Othman, Mohamed, Ahmad Zukarnain, Zuriati, Shamsan Saleh, Ahmed M.

    Published 2018
    “…To avert this problem, this study proposes a new mechanism called random traveling wave pulse-coupled oscillator algorithm, which is a self-organizing technique for energy-efficient wireless sensor networks using the phase-locking traveling wave pulse-coupled oscillator and random method on anti-phase of the pulse-coupled oscillator model. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System by Nwogbaga, Nweso Emmanuel

    Published 2023
    “…Furthermore, many IoT applications are time sensitive such as health monitory systems, augmented reality services, agriculture, pest control, online natural language processing, smart home applications, smart cities, safe driving, waste management, emergency response systems, and traffic control systems. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. …”
    Get full text
    Get full text
    Get full text
    Article