Search Results - (( development communication study algorithm ) OR ( java implication _ algorithm ))

Refine Results
  1. 1

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Bitwise-based Routing Algorithms in Optical Multistage Interconnection Network by Abed, Farzaneh

    Published 2007
    “…In the first, the Improved Zero algorithm is proposed to solve the problem and secondly, the Bitwise Improved Zero algorithm is developed. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…The purpose of this study was to design and develop new secure plug-in on Microsoft Outlook using integration of symmetric and asymmetric cryptographic algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…The damage, due to uncontrolled noise reciprocating motion in the machines or broadband noise from wind or other sources, is identified based on frequency testing in an operator. Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Performance enhancement of AIMD algorithm for congestion avoidance and control by Jasem, Hayder Natiq

    Published 2011
    “…National Chiao Tung University’s network simulation (NCTUns) has been used in this development to compare the new algorithm with the older versions and determine its advantages over the older versions. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R.

    Published 2023
    “…Meanwhile, the rapid development of global system for mobile communication (GSM) systems makes communicating parties more vulnerable than ever to security attacks. …”
    Article
  7. 7

    A Comparative Study on Compression of Different Image File Formats by Ooi, Poh San

    Published 1999
    “…From the study, it can be concluded that LZW algorithm is better than RLE algorithm in term of percentage compression. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Noise Cancellation method in assistive listening system by Noor Aliff, Noor Affande

    Published 2020
    “…The noise cancellation system is categorized as active type of noise cancelling method as it includes adaptive filter and adaptive algorithm. This study also dedicated to use various type of adaptive algorithm to test the performance of each adaptive algorithm in order to identify the most efficient of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    Article
  10. 10

    Towards developing a web application with text filtering for FTMSK : A case study for electronic exchange board / Sumardi Shukor by Shukor, Sumardi

    Published 2006
    “…The traditional filtering mechanism in the Electronic Exchange Board might not be able to distinguish the offensive words that have been masked. Hence, this study is conducted to identify potential techniques can be used to mask the offensive words and a new textual filtering algorithm will be developed to resolve this problems. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    WCDMA forward link capacity improvement by using adaptive antenna with genetic algorithm assisted MDPC beamforming technique by Kiong T.S., Ismail M., Hassan A.

    Published 2023
    “…A dynamic radio network simulator was developed in Visual C++� to study the power consumption at Node B and estimate the downlink capacity improvement by implementing this novel algorithm. …”
    Article
  14. 14

    Variable Global Optimization min-sum (VGOMS) algorithm of decode-and forward-protocol for the relay node in the cooperative channel by Hushairi, Zen, Al-Khalid, Hj Othman, Khairuddin, Abdul Hamid, Jamaah, Suut

    Published 2020
    “…The excessive delay due to the complexity of the decoding process at the relay node results in additional delays at the destination which is a significant issue in cooperative communication channels. A low complexity min-sum (MS) based algorithm called the Variable Global Optimization min-sum (VGOMS) algorithm has been developed to minimise the error corrective performance. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Text normalization algorithm for facebook chats in Hausa language by Jaafar, Zubairu Maitama, Haruna, Usman, Gambo, Abdullahi Ya'u, Thomas, Bimba Andrew, Idris, Norisma, Ya’u Gital, Abdulsalam, Abubakar, Adamu

    Published 2014
    “…The proposed algorithm manually developed dictionary that employ normalization of each non-standard word with its equivalent standard word. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    A collaborative model for post flood activities exploiting an enhanced expanding neighborhood search algorithm by Hasan, Md Munirul

    Published 2019
    “…In this model, exploiting TV White Space spectrum as network backhaul links for acquiring and communicating post-flood emergency data. The primary method of developing the proposed system builds upon a layered architecture of wireless local, regional and wide-area communications, and incorporates collaborative network components among these layers. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    The use of people rank technique for data dissemination in opportunistic network by Donna, Christen George

    Published 2015
    “…In this paper, we are going to develop on one of the forwarding algorithm, People Rank algorithm, which is a social-based forwarding algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  19. 19

    Analysis on reading image through camera image by Amir Hamzah Ani

    Published 2024
    text::Final Year Project
  20. 20

    Sentiment analysis regarding marital issues using Naive Bayes algorithm / Farah Nabila Mohd Razali by Mohd Razali, Farah Nabila

    Published 2025
    “…This study explores the application of sentiment analysis using the Naive Bayes algorithm to understand public perceptions of marital issues, particularly factors contributing to the rising divorce rate. …”
    Get full text
    Get full text
    Thesis