Search Results - (( developing communication components algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing communication »
- communication components »
- components algorithm »
- implication based »
- java implication »
-
1
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
2
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…This enables smart grid to communicate with each of its devices and applications in monitoring and controlling the components remotely. …”
text::Thesis -
3
-
4
Wireless water quality cloud monitoring system with self-healing algorithm
Published 2017Get full text
Get full text
Conference or Workshop Item -
5
Development of coordinating algorithm for rendezvous task of mobile robots
Published 2023“…To accomplish this task, a coordinating algorithm was developed that allows the robots to work together in a distributed manner. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…The initial investigation on the existing LDPC code decoding algorithms assists to develop a low complexity LDPC code decoding algorithm. …”
Get full text
Get full text
Get full text
Thesis -
7
A collaborative model for post flood activities exploiting an enhanced expanding neighborhood search algorithm
Published 2019“…In this model, exploiting TV White Space spectrum as network backhaul links for acquiring and communicating post-flood emergency data. The primary method of developing the proposed system builds upon a layered architecture of wireless local, regional and wide-area communications, and incorporates collaborative network components among these layers. …”
Get full text
Get full text
Thesis -
8
A block cipher based on genetic algorithm
Published 2016“…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
Get full text
Get full text
Get full text
Thesis -
9
Performance analyses of adaptive handover decision algorithm using spectrum aggregation in long term evolution - advanced network
Published 2021“…The proposed TVWS algorithm showed average low RLF rate values than the Conventional (CONV) and Multi-Influence Factors Handover Decision Algorithms (MIF-HODA). …”
Get full text
Get full text
Conference or Workshop Item -
10
Coverage performance analysis of genetic algorithm controlled smart antenna system
Published 2023Conference paper -
11
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…The experimental result of ICA algorithm exhibits that each ECG signal is unique to each other as each signal is composed strongly from each different independent component and approximately zero relative to other independent components. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication
Published 2013“…The results are then communicated between hardware circuit and simulation circuit for the final conclusion with the properly functional algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
14
Comparative study of some symmetric ciphers in mobile systems
Published 2014“…There are various symmetric cryptographic algorithms such as KASUMI cipher, SNOW cipher, ZUC cipher, and AES cipher have been developed for achieving secure mobile communication systems. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
-
16
A review of electric vehicle charging management based on the communication between EV, RSU and CS
Published 2024“…Electric vehicles (EV) equipped with communication devices and wireless sensors such as an onboard unit (OBU) allow wireless communication between electric vehicles (EV) and roadside units (RSU) called V2I and between electric vehicles and smart grid components such as charging stations (CS) called V2G. …”
Conference Paper -
17
-
18
Adaptive algorithms for automated intruder detection in surveillance networks
Published 2014Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Agro-ento bioinformation: towards the edge of reality
Published 2002“…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
Get full text
Get full text
Inaugural Lecture -
20
A multidrop optical network testbed for EPON platform
Published 2023“…For the data transmission process, a communication protocol, i.e Multi-Point Control Protocol (MPCP) is required to avoid collision of the data that travel between the OLT and ONU This paper describes an effort in developing an EPON environment with MPCP for the OLT and ONU communications. …”
Conference paper
