Search Results - (( development communication model algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    A collaborative model for post flood activities exploiting an enhanced expanding neighborhood search algorithm by Hasan, Md Munirul

    Published 2019
    “…In this model, exploiting TV White Space spectrum as network backhaul links for acquiring and communicating post-flood emergency data. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Detection of Malaysian sign language with single shot detector algorithm/ Nurfarah Idayu Mohamad Fauzi, Shahirah Mohamed Hatim and Zalikha Zulkifli by Mohamad Fauzi, Nurfarah Idayu, Mohamed Hatim, Shahirah, Zulkifli, Zalikha

    Published 2023
    “…Moreover, the promising results of the research indicate the potential for mobile applications utilizing the developed model to significantly enhance communication and inclusivity for individuals with hearing impairments in Malaysia.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…For this purpose, the FEM is implemented to model three communication towers with a height of 15, 30, and 45m to develop the frequency correlation factor. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication by JAM'AAH, SUUD

    Published 2021
    “…Thus, the LDPC code encoder model is developed to identify a low complexity encoding algorithm of LDPC code for the DF protocol relay system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Verification correctness properties for aggregation behavior of swarm robotics system using SPIN model checker / Siti Shafinaz Ali by Ali, Siti Shafinaz

    Published 2015
    “…This research work focused on a developed swarm algorithm aimed at swarm aggregation. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Non pilot and pilot aided least square channel estimation algorithm in MIMO-OFDM system / Nursarah Ainaa Abdul Halim by Abdul Halim, Nursarah Ainaa

    Published 2013
    “…Wireless communication is a developed technology and had been widely used nowadays, so the developments in digital communication are rapidly increasing to meet the ever increasing demand of higher data rates. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    Comparison of hidden Markov Model and Naïve Bayes algorithms among events in smart home environment by Babakura, Abba, Sulaiman, Md Nasir, Mustapha, Norwati, Kasmiran, Khairul A.

    Published 2014
    “…The subsystems, due to their diversified nature develop difficulties as the events communicate making the smart home uncomfortable. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Load-Balancing Models for Scheduling Divisible Load on Large Scale Data Grids by Abduh Kaid, Monir Abdullah

    Published 2009
    “…In addition, the integration of the proposed DLT model with Simulated Annealing (SA) algorithm has been also developed. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    Article
  19. 19
  20. 20

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article