Search Results - (( _ compression path algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network by Ahmed Al-Doori, Ahmed Jamal

    Published 2018
    “…The protocol compares the power available on all the paths from source to sink and then selects the path with highest power. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7

    Multi-user mmWave MIMO channel estimation with hybrid Beamforming over frequency selective fading channels by Uwaechia, Anthony Ngozichukwuka, Mahyuddin, Nor Muzlifah, Ain, Mohd Fadzil, Abdul Latiff, Nurul Muazzah, Za'bah, Nor Farahidah

    Published 2020
    “…Simulation results show that the proposed algorithm is effective and offer a better CE performance in terms of MSE when compared to the generalized block orthogonal matching pursuit (G-BOMP) algorithm that does not possess a pruning step.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9

    A collision resistant cryptographic hash function based on cellular automata rules by Jamil, Norziana

    Published 2013
    “…This is due to its new non-linear recursive function for message expansion that gives higher codewords with minimal weight,its step operation that employs stitching permutation in a target-heavy Balanced Feistel Network that gives no set of conditions for the construction of collision path using established differential attack being constructed, and cryptographically strong Boolean function used in the compression function of STITCH-256 that gives strong non-linearity and diffusion property.…”
    Get full text
    Get full text
    Thesis
  10. 10

    End to end performance analysis over IP RAN network / Armi Shahran Mohamad by Mohamad, Armi Shahran

    Published 2011
    “…With the additional header compression and packet multiplexing technologies, IP networks provide higher efficiency than ATM. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Modelling of geometric correction and relative radiometric normalization for near equatorial earth observation satellite images by Al-Razzaq Abd, Hayder Abd

    Published 2015
    “…Then, grayscale and image compression are performed. Automatic control point extraction is then performed to generate control points automatically. …”
    Get full text
    Get full text
    Thesis