Search Results - (( information communication through algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- communication through »
- through algorithm »
- implication based »
- java implication »
-
1
Text normalization algorithm for facebook chats in Hausa language
Published 2014“…The rapid increase in using non-standard words (NSWs) in communication through the social media is causing difficulties in understanding contents of the text messages. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Agro-ento bioinformation: towards the edge of reality
Published 2002“…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
Get full text
Get full text
Inaugural Lecture -
3
Performance evaluation of direction of arrival (DOA) for linear array antenna design using multiple signal classification (MUSIC) algorithm in variation of displacement vectors and...
Published 2007“…In Smart Antenna system, the intelligence of the system depends on the information collected, processed and implemented through an algorithm i.e. …”
Get full text
Get full text
Thesis -
4
Enhanced multi-hop mechanism in vehicular communication system using swarm algorithm
Published 2021“…Vehicular network is modelled in Simulation of Urban Mobility (SUMO) and the algorithm is formulated in MATLAB. Data is extracted from SUMO through Traffic Control Interface for MATLAB (TraCI4Matlab). …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
5
Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi
Published 2019“…This paper analyzes how information sent through mobile messaging application is being secured. …”
Get full text
Get full text
Student Project -
6
-
7
-
8
-
9
Comparative study of some symmetric ciphers in mobile systems
Published 2014“…Symmetric cryptographic algorithms have been proposed to protect the information of the senders and receivers through mobile systems. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Hybrid LTE-VANETs Based Optimal Radio Access Selection
Published 2018“…In particular, it carries and distributes information, inter-communicates, and is capable of communicating with other stationary units deployed along the roadways. …”
Get full text
Get full text
Get full text
Book Chapter -
11
Simplified channel authentication algorithm for secure quantum key distribution
Published 2014Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…By considering the ASVs as swarm robotics testing platforms, each algorithm is evaluated and benchmarked against several existing algorithms through simulation studies. …”
Get full text
Get full text
Thesis -
13
Hardware Implementation Of Rc4a Stream Cipher Algorithm
Published 2007“…Therefore, a mechanism is required to guarantee the security and privacy of information. Under the existing circumstances cryptography is the only convenient method for protecting information transmitted through communication networks. …”
Get full text
Get full text
Thesis -
14
Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud
Published 2014“…Then, time processing and accuracy which one is the best of algorithms will be determine. The research is provide useful significance that able to detect identity of user allow as anonymous and able to detect location of user through IP Address. …”
Get full text
Get full text
Thesis -
15
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…Online social networks (OSNs) portray a multi-layer of interactions through which users become a friend, information is propagated, ideas are shared, and interaction is constructed within an OSN. …”
Get full text
Get full text
Article -
16
-
17
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
18
A review of electric vehicle charging management based on the communication between EV, RSU and CS
Published 2024“…This algorithm ensures that the needs of electric vehicles are met by supplying them with energy through information obtained between the electric vehicle, RSU, and CS. …”
Conference Paper -
19
Performance enhancement of AIMD algorithm for congestion avoidance and control
Published 2011“…Secondly, telephone communication is used only for voice messages while the packets in packet switch network can contain any kind of information, even voice messages. …”
Get full text
Get full text
Thesis -
20
Time Synchronization Using Distributed Observer Algorithm With Sliding Mode Control For Wireless Sensor Network
Published 2015“…The algorithm is known as Time Synchronization using Distributed Observer algorithm with Sliding mode control element (TSDOS).The main purpose of proposing TSDOS is to estimate a common global clock time by which all nodes within the WSN can use it for communication purpose. …”
Get full text
Get full text
Thesis
