Search Results - (( information communication through algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Text normalization algorithm for facebook chats in Hausa language by Jaafar, Zubairu Maitama, Haruna, Usman, Gambo, Abdullahi Ya'u, Thomas, Bimba Andrew, Idris, Norisma, Ya’u Gital, Abdulsalam, Abubakar, Adamu

    Published 2014
    “…The rapid increase in using non-standard words (NSWs) in communication through the social media is causing difficulties in understanding contents of the text messages. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Agro-ento bioinformation: towards the edge of reality by Syed Hassan, Syed Tajuddin

    Published 2002
    “…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
    Get full text
    Get full text
    Inaugural Lecture
  3. 3

    Performance evaluation of direction of arrival (DOA) for linear array antenna design using multiple signal classification (MUSIC) algorithm in variation of displacement vectors and... by Hamzah, Norhayati

    Published 2007
    “…In Smart Antenna system, the intelligence of the system depends on the information collected, processed and implemented through an algorithm i.e. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Enhanced multi-hop mechanism in vehicular communication system using swarm algorithm by Kit, Guan Lim, Ke Wen Teh, Wen Teh, Min, Keng Tan, Herwansyah Lago, Soo, Siang Yang, Tze, Kenneth Kin Teo

    Published 2021
    “…Vehicular network is modelled in Simulation of Urban Mobility (SUMO) and the algorithm is formulated in MATLAB. Data is extracted from SUMO through Traffic Control Interface for MATLAB (TraCI4Matlab). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  5. 5

    Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi by Mohd Khlubi, Aida Najihah

    Published 2019
    “…This paper analyzes how information sent through mobile messaging application is being secured. …”
    Get full text
    Get full text
    Student Project
  6. 6
  7. 7
  8. 8
  9. 9

    Comparative study of some symmetric ciphers in mobile systems by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2014
    “…Symmetric cryptographic algorithms have been proposed to protect the information of the senders and receivers through mobile systems. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Hybrid LTE-VANETs Based Optimal Radio Access Selection by Ayoob, Ayoob A., Su, Gang, Wang, Desheng, Mohammed, Muamer N., Hammood, Omar A.

    Published 2018
    “…In particular, it carries and distributes information, inter-communicates, and is capable of communicating with other stationary units deployed along the roadways. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  11. 11
  12. 12

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…By considering the ASVs as swarm robotics testing platforms, each algorithm is evaluated and benchmarked against several existing algorithms through simulation studies. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Hardware Implementation Of Rc4a Stream Cipher Algorithm by Al Noman, Abdullah

    Published 2007
    “…Therefore, a mechanism is required to guarantee the security and privacy of information. Under the existing circumstances cryptography is the only convenient method for protecting information transmitted through communication networks. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud by Mat Daud, Nur Shafikah

    Published 2014
    “…Then, time processing and accuracy which one is the best of algorithms will be determine. The research is provide useful significance that able to detect identity of user allow as anonymous and able to detect location of user through IP Address. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Identifying the influential spreaders in multilayer interactions of online social networks by Al-Garadi, M.A., Varathan, Kasturi Dewi, Ravana, S.D., Ahmed, E., Chang, V.

    Published 2016
    “…Online social networks (OSNs) portray a multi-layer of interactions through which users become a friend, information is propagated, ideas are shared, and interaction is constructed within an OSN. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A review of electric vehicle charging management based on the communication between EV, RSU and CS by Mohammed D., Mansor M.B., Hock G.C.

    Published 2024
    “…This algorithm ensures that the needs of electric vehicles are met by supplying them with energy through information obtained between the electric vehicle, RSU, and CS. …”
    Conference Paper
  19. 19

    Performance enhancement of AIMD algorithm for congestion avoidance and control by Jasem, Hayder Natiq

    Published 2011
    “…Secondly, telephone communication is used only for voice messages while the packets in packet switch network can contain any kind of information, even voice messages. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Time Synchronization Using Distributed Observer Algorithm With Sliding Mode Control For Wireless Sensor Network by Yew, Tze Hui

    Published 2015
    “…The algorithm is known as Time Synchronization using Distributed Observer algorithm with Sliding mode control element (TSDOS).The main purpose of proposing TSDOS is to estimate a common global clock time by which all nodes within the WSN can use it for communication purpose. …”
    Get full text
    Get full text
    Thesis