Search Results - (( basic communication issues algorithm ) OR ( code classification parallel algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication by Yasir, Javed

    Published 2020
    “…This concept of multihop D2D communication has introduced a number of issues that were non-prevalent in current cellular communication. …”
    Get full text
    Get full text
    Thesis
  6. 6

    On line fault detection for transmission line using power system stabilizer signals by Ali Falifla, Hamza AbuBeker

    Published 2007
    “…Hence, this study will show that not only the PSS able to compensate the damping due to the disturbance but also by using the developed algorithm it succeeds to detect and classify the fault conditions on the parallel transmission lines.…”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks by Ismail Abdullah, Kalid Abdlkader Marsal

    Published 2024
    “…For the proliferation of wireless sensor network, in different environments, an escalation in the lifetime of wireless sensors is mandatory, because among the basic issues concerning WSN is a successful effort to document the coverage of the number of target fields, while maximizing the lifetime of this network. …”
    Article
  10. 10

    Position-based QoS multicast routing protocol for mobile Ad Hoc Networks by Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Qabajeh, Mohammad M., Qabajeh, Liana K.

    Published 2010
    “…For group-oriented multimedia applications Quality of Service (QoS) provision is a basic requirement, which makes an efficient QoS multicast routing protocol a very important issue. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12

    Improving PID controller of motor shaft angular position by using genetic algorithm by Muhamad, Arif Abidin

    Published 2015
    “…This problem among other is affected by existing the nonlinearities component in the system, the system communication noise, and not optimize PID parameter. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    The enhanced fault-tolerant AODV routing protocol for Wireless Sensor Network by Che-Aron, Zamree, Mohammed Al-Khateeb, Wajdi Fawzi, Anwar, Farhat

    Published 2010
    “…Basically, wireless sensor networks suffer from resource limitations, high failure rates and faults caused by the defective nature of wireless communication and the wireless sensor itself. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Enhanced Mobility Solution In Mobile Ipv6 Network by David, Adeniji Oluwashola

    Published 2008
    “…Enhanced Mobility Solution in Mobile IPv6 Network is extremely complex; the study addressed the multihoming issues of MIPV6 Networks on the basis of NEMO Basic Support, analyzes the benefits of multihoming and discusses implementation issues of all classes of multihoming possibilities. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil by Idris, Siti Aishah, Ahmad Fadzil, Ahmad Firdaus

    Published 2024
    “…Hence, the development of real-time baby sign language recognition on mobile platforms could help to address these issues. This research will focus only on six basic baby sign languages that are commonly used in daily life. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A deep learning approach: The impact of sentiment analysis of Bangladeshi workers over the world by Tomal, Md Raihanul Islam, Kader, Tanveer, Kohbalan, Moorthy, Mazlina, Abdul Majid

    Published 2025
    “…TF-IDF vectorization was used for feature extraction, followed by basic machine learning algorithms such as Decision Tree, Support Vector Machine, and Naive Bayes. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…Computer networks are becoming increasingly important to the delivery of modern society's basic services. As a result of this growing dependence, traffic and users worldwide have also grown. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis