Search Results - (( developing communication ideas algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing communication »
- communication ideas »
- implication based »
- java implication »
- ideas algorithm »
-
1
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…An algorithm for selecting communication system is developed by comparing Received Signal Strength Indicator (RSSI) of Wi-Fi and GSM with the priority given to Wi-Fi, followed by GSM and RF. …”
Get full text
Get full text
Thesis -
3
Greedyzero-based scheduling algorithm to route in optical low stage interconnection networks
Published 2012“…This algorithm has been developed to achieve performance goals in terms of 50% reduction in the number of passes.…”
Get full text
Get full text
Thesis -
4
Performance analysis of power control schemes in CDMA communication system
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
5
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…Extended from the FastZ algorithms, another three new algorithms called the FastRLP, BRLP and FastBRLP algorithms are developed to achieve different performance goals. …”
Get full text
Get full text
Thesis -
6
-
7
A highly efficient algorithm for phased-array mmWave massive MIMO beamforming
Published 2021“…With the rapid development of the mobile internet and the internet of things (IoT), the fifth generation (5G) mobile communication system is seeing explosive growth in data traffic. …”
Get full text
Get full text
Article -
8
-
9
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…The results analysis concluded that improving the accuracy of influential spreaders identification in OSNs is not only by improving identification algorithms but also by developing a network topology that represents the information diffusion well. …”
Get full text
Get full text
Article -
10
A block cipher based on genetic algorithm
Published 2016“…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
Get full text
Get full text
Get full text
Thesis -
11
The integration of Voip and e-Learning system in a collaborative learning environment / Ahmad Zulkhair Zakaria
Published 2006“…A reliable and fast communication is really crucial nowadays to support the rapid development of technologies. …”
Get full text
Get full text
Student Project -
12
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Hence, the major problem is developing a scheduling algorithm which creates a trade-off between the system performances. …”
Get full text
Get full text
Thesis -
13
Enhancing NoC-based MPSoC performance: a predictive approach with ANN and guaranteed convergence arithmetic optimization algorithm
Published 2023“…The effectiveness of communication within NoCs relies heavily on the routing algorithm employed. …”
Get full text
Get full text
Article -
14
ON CAMPUS IOT DEMONSTRATION FOR STUDENT HOTSPOT TRACKING USING WIRELESS SENSORS NETWORK AND INTEGRATED SOFTWARE PLATEFORM
Published 2017“…Internet of Things(IoT) has become a new trend for technology development. The current communication technology that making wireless technology becoming more reliable is one of the factor that promote IoT ideas. …”
Get full text
Get full text
Final Year Project -
15
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
Published 2008“…The first algorithm is developed to avoid the buffer overflow in the FS nodes. …”
Get full text
Get full text
Thesis -
16
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…Boyer - Moore algorithm was claimed to be the fastest algorithm among the others. …”
Get full text
Get full text
Research Reports -
17
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
18
A hybrid approach to semi-supervised named entity recognition in health, safety and environment reports
Published 2009Get full text
Get full text
Conference or Workshop Item -
19
-
20
