Search Results - (( development communication optimisation algorithm ) OR ( java implication force algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    An extended adaptive mechanism of evolutionary based channel assignment via reinforcement by Teo, Kenneth Tze Kin, Yew, Hoe Tung, Lye, Scott Carr Ken, Lim, Kit Guan, Ang, Soo Siang, Khairul Anuar Mohamad, Ali Chekima, Liau, Chung Fan, Aroland Jilui Kiring

    Published 2012
    “…Current development in the field of wireless mobile communication is extremely limited by the capacity constraints of the available frequency spectrum. …”
    Get full text
    Get full text
    Research Report
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Smart site monitoring system / Muhammad Azmi and Muhammad Naim Mahyuddin by Azmi, Muhammad, Mahyuddin, Muhammad Naim

    Published 2023
    “…The Smart Site Monitoring System is an innovative and integrated approach designed to optimise a construction site management. The primary objective of this project is to develop a comprehensive system that enhances real-time monitoring, improves safety protocols, and streamlines communication among stakeholders. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Machine Learning-Enabled Communication Approach for the Internet of Medical Things by Rahim Khan, Abdullah Ghani, Samia Allaoua Chelloug, Mohammed Amin, Aamir Saeed, Jason Teo

    Published 2023
    “…Apart from that, every device is bound to hold a supplementary path, preferably a second optimised path, for situations where the current communication path is no longer available, either due to device failure or heavy traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Computational intelligence approach for classification and risk quantification of metabolic syndrome / Habeebah Adamu Kakudi by Habeebah Adamu , Kakudi

    Published 2019
    “…Genetic Algorithm(GA) is used to optimize the order of sequence of the input sample and the parameters of the Bayesian ARTMAP (BAM). …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…Therefore, pedestrian behaviour classification is a perfect solution in providing safety for both pedestrians and vehicles by exchanging movement information among entities via wireless communication. However, wireless communication has critical issues with network failure, and these issues significantly affect the communication system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…Therefore, pedestrian behaviour classification is a perfect solution in providing safety for both pedestrians and vehicles by exchanging movement information among entities via wireless communication. However, wireless communication has critical issues with network failure, and these issues significantly affect the communication system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Discrepancy and thematic bibliometric analyses of the remaining limitations in artificial intelligence by M. Mansor, Mahayaudin, Ibrahim, Nurain, Ahmad Radi, Noor Fadhilah, Abdul Rahim, Nadirah, Yahaya, Syarul Heiry, Abu Bakar, Mohd Aftar, Zakaria, Roslinazairimah

    Published 2024
    “…As artificial intelligence (AI) advances, it is essential to continuously comprehend its limitations to optimise the integration of AI into autonomous systems that empower humans. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18
  19. 19

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…In addition, a new optimisation model for finding optimum parameter values in the MEDF and an algorithm for transmuting a 1D quantitative feature into a respective categorical feature are developed to facilitate the model. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20