Search Results - (( development communication during algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…An algorithm for selecting communication system is developed by comparing Received Signal Strength Indicator (RSSI) of Wi-Fi and GSM with the priority given to Wi-Fi, followed by GSM and RF. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…During the last two decades, many protocols suggested in order to handle the adverse environment of underwater communications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…During the last two decades, many protocols suggested in order to handle the adverse environment of underwater communications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    A collaborative model for post flood activities exploiting an enhanced expanding neighborhood search algorithm by Hasan, Md Munirul

    Published 2019
    “…Every country has its own rescue teams and techniques to minimize the loss and suffering during the flood. Communication and collaboration are one of the major issues for successful performing search and rescue operations during the flood occurrence. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Analysing machine learning models to detect disaster events using social media by Faris Azni Azlan, Mr.

    Published 2023
    “…During disasters, people communicate via messages regarding similar or different types of emergencies in the same general location. …”
    text::Thesis
  8. 8

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Void avoidance opportunistic routing density rank based for underwater sensor networks by Ismail, Nasarudin

    Published 2021
    “…Finally, the algorithm Void Avoidance Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with the communication void by introducing a simple method to detect a void node and avoid it during the forwarding process. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    Article
  12. 12
  13. 13

    Ascertaining trust of information transmitted during a disaster by Yusoff, Y., Bakar, A.A., Aziz, N., Ismail, R., Ramli, R.

    Published 2016
    “…During a disaster, especially at the beginning, a huge amount of information is being communicated by the victims to the authority/rescuer. …”
    Get full text
    Get full text
    Article
  14. 14

    Ascertaining trust of information transmitted during a disaster by Yusoff, Y., Bakar, A.A., Aziz, N., Ismail, R., Ramli, R.

    Published 2016
    “…During a disaster, especially at the beginning, a huge amount of information is being communicated by the victims to the authority/rescuer. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    A framework of rough cultural algorithms in optimizing mobile web caching performance by Sulaiman, Sarina, Shamsuddin, Siti Maryam, Abraham, Ajith, Sulaiman, Shahida

    Published 2007
    “…Consequently, The proposed caching scheme, Rough Cultural Algorithm (RCA) is developed to materialise the caching policies.…”
    Get full text
    Get full text
    Article
  17. 17

    Agro-ento bioinformation: towards the edge of reality by Syed Hassan, Syed Tajuddin

    Published 2002
    “…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
    Get full text
    Get full text
    Inaugural Lecture
  18. 18

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…One of the critical areas is, secured communication which helps to protect the confidentiality and integrity of information during transmission and storage. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Haar cascade algorithm for microsleep detection by Awang, Norkhushaini, Azhar, Ahmad Mirza

    Published 2025
    “…During the development phase, the system was built in Python using OpenCV and dlib for real-time facial analysis and the Haar Cascade algorithm for efficient facial feature detection. …”
    Get full text
    Get full text
    Article
  20. 20

    Ascertaining trust of information transmitted during a disaster by Yusoff Y., Bakar A.A., Aziz N., Ismail R., Ramli R.

    Published 2023
    “…During a disaster, especially at the beginning, a huge amount of information is being communicated by the victims to the authority/rescuer. …”
    Article