Search Results - (( development programs protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- development programs »
- protocol algorithm »
- implication based »
- java implication »
-
1
Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network
Published 2003“…The algorithm was developed in Visual Basic 6.0v programming language. …”
Get full text
Get full text
Thesis -
2
Optimal forwarding routing protocol in ipv6-based wireless sensor network
Published 2009“…Then, developed code is programmed into TelosB radio sensors boards in WSN test beds. …”
Get full text
Get full text
Thesis -
3
A protocol for developing a classification system of mosquitoes using transfer learning
Published 2022“…Transfer learning is a type of machine learning that is viable and durable in image classification with limited training images. This protocol aims to develop step-by-step procedure in developing a classification system with transfer learning algorithm for mosquito, we demonstrate the protocol to classify two species of Aedes mosquito - Aedes aegypti L. and Aedes albopitus L, but user can adopt the protocol for higher number of species classification. …”
Get full text
Get full text
Get full text
Article -
4
TELE-OPERATED ROBOT USING VC PROGRAMMING PROTOCOL
Published 2007Get full text
Get full text
Final Year Project -
5
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
6
Hypertension Among Dental Patients: A Single Institution Experience And Development Of A Working Clinical Algorithm For Dental Practitioners
Published 2026journal::journal article -
7
Enhancing problem-solving skills of novice programmers in an introductory programming course
Published 2023Article -
8
Fiber-Wireless testbed using software defined radio for protocol and algorithm testing
Published 2023“…It is chosen to be used in this paper as it is equipped with a user-friendly programming platform; LabVIEW. To test the testbed's reprogrammability feature, two algorithms are implemented for proof-ofconcept; collision avoidance and dynamic bandwidth allocation. …”
Article -
9
-
10
-
11
-
12
Video traffic analysis on Unifi broadband network / Laina Sofia Mahamad
Published 2017“…Thirdly, to identify best traffic model based on fitted model in developing network traffic bandwidth control algorithms. …”
Get full text
Get full text
Thesis -
13
A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus
Published 2023“…Improved Fast Evolutionary Programming (IFEP), Evolutionary Programming- Dolphin Echolocation Algorithm (EPDEA) and Evolutionary Programming-Firefly Algorithm (EPFA). …”
Get full text
Get full text
Thesis -
14
Development of LabVIEW FPGA program for Energy Management System (EMS) Controller for Hybrid Electric Vehicle (HEV)
Published 2016Get full text
Get full text
Final Year Project -
15
Improving the security model of software define networks
Published 2023“…An by securing the connection between the main controller and northbound administration with the use of certain algorithm hashing protocol, it would further increase the security of the command line in the whole network. …”
text::Final Year Project -
16
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
17
-
18
-
19
Secure radio telemetry and data acquisition using wireless data communication system with portable UHF transceivers / Mohd Dani Baba and Deepak Kumar Ghodgaonkar
Published 2003“…On the other hand, BTS comprises of a personal computer equipped with data acquisition software, voice band modem and a portable UHF transceiver. A software programming based on LabVIEW was developed for data processing and presentation at both RTS and BTS. …”
Get full text
Get full text
Research Reports -
20
Asynchronous point to point FSK- FM radio telemetry system with data encryption for monitoring environmental conditions / Shuhaimi Shamsuddin
Published 2003“…The data collected at RTS site are encrypted prior to transmission to the BTS by employing the One Time Pad (OTP) and Caesar Cipher algorithms. Serial asynchronous transmission was used as data communication protocol via RS232 port. …”
Get full text
Get full text
Thesis
