Search Results - (( data distribution issues algorithm ) OR ( data distribution connection algorithm ))

Refine Results
  1. 1

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…Connectivity is a critical issue in WSNs, as the data collected needs to be sent to the base station or the processing centers. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…One of the challenging issues for a grid-connected distributed generation is to find a suitable technique to detect an islanding problem. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Towards enhancing power system protection in distribution systems with distributed generation: a graph theory-based systematic relay placement approach by Ahmad Razani Haron, Ngu, Mee Chung, Pungut Ibrahim, Megat Muhammad Ikhsan Megat Hasnan, Nur Aqilah Mohamad, Chai, Chang Yii, Herwansyah Lago, Markus Diantoro

    Published 2024
    “…Results show consistent and reliable relay placement locations, considering DG locations and load priorities. The algorithm's speed, effectiveness, and adaptability to different network topologies make it a promising approach for power system protection planning in distribution systems with distributed generation.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…Similarly, in terms of flat priority based scheduling issues, the proposed algorithm also is found to be of higher performance up to 42 users for video applications and 60 users for the metering data applications. …”
    Get full text
    Get full text
    Thesis
  6. 6

    OFF-GRID SOLAR PHOTOVOLTAIC (PV) DESIGN BASED ON FUZZY TECHNIQUE FOR ORDER PERFORMANCE BY SIMILARITY TO IDEAL SOLUTION (TOPSIS) APPROACH by NUR AFIQAH, JAHILAN

    Published 2022
    “…PV technology comprises the grid-connected PV systems and off-grid PV systems. Off-grid PV systems generate and distribute electrical energy independently, unlike the grid-connected PV systems. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  7. 7

    Characterization of Internet Traffic in UUM Wireless Networks by Abdullah, Wisam Dawood

    Published 2012
    “…The trace composes of two parts: firstly, one that connects to the core switch in computer center which is connected with the distribution switches that link the Access Point (APs) with the wireless network at campus, and secondly, another one for the measurement of bulk data transfers and interactive data exchange between two nodes in UUM library, which had been initiated at that time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN by Ibrahim, Nurul Saliha Amani

    Published 2022
    “…Due to finite resource, multiple issues need to be considered in designing such system, including AG flight time, coverage radius and the achievable data rate of the ground-to-air system, thus an Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network by Ahmed Al-Doori, Ahmed Jamal

    Published 2018
    “…The consume power fairly (CPF) protocol achieves a high power efficiency by distributing power consumption equal on all the network nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure by Khalid, Roszelinda

    Published 2018
    “…The main attraction is to provide a secure channel between a cloud client to establish a connection among them by applying the theories from Von Neumann and Shannon entropies and also Shor's algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Exploring employee working productivity: initial insights from machine learning predictive analytics and visualization by Razali, Mohd Norhisham, Ibrahim, Norizuandi, Hanapi, Rozita, Mohd Zamri, Norfarahzila, Abdul Manaf, Syaifulnizam

    Published 2023
    “…Future research can explore more advanced machine learning algorithms, incorporate time-series analysis for temporal dependencies, and expand data collection from diverse organizational settings to improve the generalizability of predictive models.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Multicast-unicast key management and data delivery method in wireless IPv6 networks by Zare Anari, Abbas Mehdizadeh

    Published 2012
    “…Whenever a new node is granted to join or leave a multicast group, a new key should be generated and distributed to every node in the network. Considering a highly dense environment where connection of users to the network is frequently changing due to join or leave operations, such approach may burden a network device with a huge amount of complex encryption and decryption process.While a number of algorithms has been proposed to address this issue, most of the existing approaches have to increase their encryption and decryption cycles in order to maintain the security level of the key management, thereby again suffering from high computation cost. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Binary Vote Assignment on Cloud Quorum Algorithm for Fragmented MyGRANTS Database Replication by Noraziah, Ahmad, Ainul Azila, Che Fauzi, Herawan, Tutut, Zailani, Abdullah

    Published 2015
    “…Therefore, the storage, availability, and consistency are important issues to be addressed in order to allow distributed users efficiently and safely access data from many different sites. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Density based subspace clustering: a case study on perception of the required skill by Rahmat Widia, Sembiring

    Published 2014
    “…This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Density subspace clustering: a case study on perception of the required skill by Sembiring, Rahmat Widia

    Published 2014
    “…This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A novel binary vote assignment grid quorum algorithm for distributed database fragmentation by Ainul Azila, Che Fauzi, Noraziah, Ahmad, Noriyani, Mohd Zin

    Published 2011
    “…Therefore, the storage, availability, and consistency are important issues to be addressed in order to allow distributed users efficiently and safely access data from many different sites. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20