Search Results - (( data communications function algorithm ) OR ( java implementation tree algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…In a conclusion, SEM prototype and adaptive communication data transfer algorithm with a combination of the three communication will be another method to solve a single communication problem of SM and suitable in residential location that offered the proposed communication infrastructure.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Comparison analysis of stream cipher algorithms for digital communication by Mat Sidek, Abd. Rahim, Sha'ameri, Ahmad Zuri

    Published 2007
    “…The stream cipher algorithms evaluated are based on the linear feedback shift register (LFSR) with nonlinear combining function. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems by Subramaniam, Jeevan Rao

    Published 2006
    “…The adaptive algorithms are evaluated as a function of the number of iterations it takes to converge and its transmission performance are compared. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Embedded Ethernet System For Real-Time Communication by Thiagarajan, Durgesh

    Published 2018
    “…Real-time communication (RTC) indicates the transmission of data or message between two medium that occur with minimum delay or latency. …”
    Get full text
    Get full text
    Monograph
  11. 11
  12. 12

    Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed by Mohamed, Kamsiah

    Published 2022
    “…In the symmetric key, a block cipher is an important primitive to provide confidentiality for data transmitted in insecure communication environments. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase by Alaidaros, Hashem Mohammed, A. Rasid, Mohd Fadlee, Othman, Mohamed, Raja Abdullah, Raja Syamsul Azmir

    Published 2007
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Design optimization for mass sizing of LEO communication satellites / Luqman Fathurrohim...[et al.] by Fathurrohim,, Luqman, Ridanto, Eko Poetro, Fariz, Ahmad

    Published 2018
    “…The optimization starts with defining an objective function, which is the total mass of satellites, as a function of their orbit altitude, antenna transmit diameter, and nominal data rates. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Effective downlink resource management for wimax networks by Shareef, Zayd Ashraf Najeeb

    Published 2018
    “…Therefore, EDRM maximised the data transfer rate and reached effective transmission and utilisation in all the developed functions. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…Besides, the algorithm enables an accurate prediction to the center of data eye with an even number of oversampling clock to data rate ratio. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20