Search Results - (( _ compression path algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- compression path »
- java implication »
- path algorithm »
-
1
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
Published 2018“…The protocol compares the power available on all the paths from source to sink and then selects the path with highest power. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
3
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
4
An adaptive data gathering algorithm for minimum travel route planning in WSNs based on rendezvous points
Published 2019“…The algorithm is designed to consider the ME’s tour length and the shortest path tree (SPT) jointly. …”
Get full text
Get full text
Get full text
Article -
5
-
6
-
7
Multi-user mmWave MIMO channel estimation with hybrid Beamforming over frequency selective fading channels
Published 2020“…Simulation results show that the proposed algorithm is effective and offer a better CE performance in terms of MSE when compared to the generalized block orthogonal matching pursuit (G-BOMP) algorithm that does not possess a pruning step.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
9
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…This is due to its new non-linear recursive function for message expansion that gives higher codewords with minimal weight,its step operation that employs stitching permutation in a target-heavy Balanced Feistel Network that gives no set of conditions for the construction of collision path using established differential attack being constructed, and cryptographically strong Boolean function used in the compression function of STITCH-256 that gives strong non-linearity and diffusion property.…”
Get full text
Get full text
Thesis -
10
End to end performance analysis over IP RAN network / Armi Shahran Mohamad
Published 2011“…With the additional header compression and packet multiplexing technologies, IP networks provide higher efficiency than ATM. …”
Get full text
Get full text
Thesis -
11
Modelling of geometric correction and relative radiometric normalization for near equatorial earth observation satellite images
Published 2015“…Then, grayscale and image compression are performed. Automatic control point extraction is then performed to generate control points automatically. …”
Get full text
Get full text
Thesis
