Search Results - (( developing block connection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- connection algorithm »
- implication based »
- developing block »
- block connection »
- java implication »
-
1
Routing problem in rectangular mesh network using Dijkstra’s based Greedy method
Published 2018“…In this research, Dijkstra’s algorithm is used to establish the shortest connection for each net. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Routing problem in rectangular mesh network using shortest path based Greedy method
Published 2019“…In this research, Dijkstra's algorithm is used to establish the shortest connection for each net. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Routing problem in rectangular mesh network using shortest path based Greedy method
Published 2019“…In this research, Dijkstra's algorithm is used to establish the shortest connection for each net. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
Get full text
Get full text
Thesis -
5
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
Published 2014“…The study shows that the developed algorithms MKPAES and DMAC increase the performance of the WSN and improve the system resistance to attacks on the WSN. …”
Get full text
Get full text
Thesis -
6
Improving Adaptive Quality of Service for Multimedia Wireless Networks Using Hierarchical Networks Approach
Published 2004“…The key feature of this framework is the integration of the hierarchical network together with the modified Call Admission Control (CAC) algorithm and the bandwidth reallocation scheme. These schemes are developed to control the bandwidth operation of ongoing connections when the system is overloaded depending on the movement speed of a particular user assuming the speed of a mobile user would not be changed throughout the duration of a connection. …”
Get full text
Get full text
Thesis -
7
Adaptive Quality Of Service Call Admission Control With User Mobility Prediction For Multimedia Traffic Over Wireless Networks
Published 2003“…This scheme is developed to control the bandwidth operation of ongoing connections when the system is overloaded. …”
Get full text
Get full text
Thesis -
8
-
9
Development of novel distance relay scheme to prevent false tripping during power swing
Published 2017“…Moreover, a new adaptive distance protection algorithm is also developed to block the false tripping operation during power swing and unblock the operation if a fault occurs during power swing. …”
Get full text
Get full text
Thesis -
10
Fast synchronization with enhanced switching control for gridtied single-phase square wave inverter using FPGA
Published 2024“…The control algorithm was developed based on zero-crossing detection (ZCD) and digital phase-locked loop (PLL) modeling techniques using the hardware description language (HDL) and a combination of digital logic blocks in Quartus II software, where the proposed switching was applied using the square-wave switching technique through a 300-watt full-bridge experimental prototype. …”
Get full text
Get full text
Get full text
Article -
11
Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris
Published 2017“…The developed algorithm is simulated in LTE-Sim simulator released 5 in terms of three QoS metrics (1) Packet Loss Ratio (2) Delay (3) Throughput. …”
Get full text
Get full text
Get full text
Thesis -
12
Vertical Handover Decision Processes for Fourth Generation Heterogeneous Wireless Networks
Published 2013“…Thus to achieve seamless mobility and the requisite Quality of Service (QoS) in such a diverse environment, efficient ‘Vertical Handover Decision (VHD)’ algorithms needs to be designed in order to avert any degradation of services, reduction in throughput, increase in blocking probability and packet loss caused due to the unnecessary handovers, handover failures and connection breakdowns. …”
Get full text
Get full text
Get full text
Article -
13
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
14
Generalizations and Some Applications of Kronecker and Hadamard Products of Matrices
Published 2006“…The analysis indicates also that the algorithms can be easily to find the common exact solutions to the coupled matrix and matrix differential equations for partitioned matrices by using the connections between Tracy-Singh, Block Kronecker and Khatri -Rao products and partitioned vector row (column) and our definition which is the so-called partitioned diagonal extraction operators. …”
Get full text
Get full text
Thesis -
15
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
16
Constant lock circuit for DC micro-grid system
Published 2017“…For all the above, there is a need for a new interface block control to deal with these problems. For this, an algorithm system strategy for utilizing a Constant Lock Circuit in the DC micro-grid aims at maintaining a constant DC link voltage at the desired constant value of 24v to ensure high stability voltage and current without any ripple. …”
Get full text
Get full text
Get full text
Thesis -
17
Conceptual Design And Dynamical Analysis Of Aerostat System
Published 2020“…Simscape MultibodyTM, an extension of MATLAB®/Simulink that employs a block-based modelling technique is used to develop the three degrees of freedom model. …”
Get full text
Get full text
Thesis -
18
Human hearing disorder recognition model using eeg-aep based signal
Published 2022“…To improve the VGG16 architecture, some layers of the based VGG16 model were replaced with new layers in the fully connected block. Additionally, during the training of the proposed model, some convolutional layers of the base VGG16 model were frozen where the model used the pre-trained weights. …”
Get full text
Get full text
Thesis -
19
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…In past two decades, Internet has developed rapidly and has integrated in many aspects of human life. …”
Get full text
Get full text
Thesis -
20
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…It is evident from the result that the proposed algorithm able to produced better result.…”
Get full text
Get full text
Thesis
