Search Results - (( development communication during algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- development communication »
- communication during »
- implication based »
- during algorithm »
- java implication »
-
1
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…An algorithm for selecting communication system is developed by comparing Received Signal Strength Indicator (RSSI) of Wi-Fi and GSM with the priority given to Wi-Fi, followed by GSM and RF. …”
Get full text
Get full text
Thesis -
2
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
3
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009“…During the last two decades, many protocols suggested in order to handle the adverse environment of underwater communications. …”
Get full text
Get full text
Conference or Workshop Item -
4
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009“…During the last two decades, many protocols suggested in order to handle the adverse environment of underwater communications. …”
Get full text
Get full text
Conference or Workshop Item -
5
-
6
A collaborative model for post flood activities exploiting an enhanced expanding neighborhood search algorithm
Published 2019“…Every country has its own rescue teams and techniques to minimize the loss and suffering during the flood. Communication and collaboration are one of the major issues for successful performing search and rescue operations during the flood occurrence. …”
Get full text
Get full text
Thesis -
7
Analysing machine learning models to detect disaster events using social media
Published 2023“…During disasters, people communicate via messages regarding similar or different types of emergencies in the same general location. …”
text::Thesis -
8
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
9
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…Finally, the algorithm Void Avoidance Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with the communication void by introducing a simple method to detect a void node and avoid it during the forwarding process. …”
Get full text
Get full text
Thesis -
10
-
11
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
Article -
12
-
13
Ascertaining trust of information transmitted during a disaster
Published 2016“…During a disaster, especially at the beginning, a huge amount of information is being communicated by the victims to the authority/rescuer. …”
Get full text
Get full text
Article -
14
Ascertaining trust of information transmitted during a disaster
Published 2016“…During a disaster, especially at the beginning, a huge amount of information is being communicated by the victims to the authority/rescuer. …”
Get full text
Get full text
Article -
15
Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E
Published 2013Get full text
Get full text
Thesis -
16
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Consequently, The proposed caching scheme, Rough Cultural Algorithm (RCA) is developed to materialise the caching policies.…”
Get full text
Get full text
Article -
17
Agro-ento bioinformation: towards the edge of reality
Published 2002“…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
Get full text
Get full text
Inaugural Lecture -
18
A new 128-bit block cipher
Published 2009“…One of the critical areas is, secured communication which helps to protect the confidentiality and integrity of information during transmission and storage. …”
Get full text
Get full text
Thesis -
19
Haar cascade algorithm for microsleep detection
Published 2025“…During the development phase, the system was built in Python using OpenCV and dlib for real-time facial analysis and the Haar Cascade algorithm for efficient facial feature detection. …”
Get full text
Get full text
Article -
20
Ascertaining trust of information transmitted during a disaster
Published 2023“…During a disaster, especially at the beginning, a huge amount of information is being communicated by the victims to the authority/rescuer. …”
Article
