Search Results - (( java application mining algorithm ) OR ( evolution communication devices algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2
  3. 3

    A modified group authentication scheme for machine type communication in LTE/LTE-a networks by Ismail, Haqi Khalid

    Published 2018
    “…Meeting the necessities of control usage of devices and mass implement transmission is a key issue in the implementation of MTC in the Long Term Evolution/Long Term Evolution Advanced systems. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Comparison of ECC and RSA algorithms in IOT devices by Vahdati, Zeinab, Md Yasin, Sharifah, Nesheli, Ali Ghasempour, Salehi, Mohammad

    Published 2019
    “…Understanding and comparing algorithms implemented in IoT devices, regarding performance discussed in this paper. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Delay-Aware Energy-Efficient Joint Power Control and Mode Selection in Device-to-Device Communications for FREEDM Systems in Smart Grids by Fauzun Abdullah Asuhaimi, Muhammad Ali Imran, Shengrong Bu, Joao Pedro Battistella Nadas

    Published 2024
    “…The Device-to-device (D2D) communications are proposed as critical solutions to enhance the performance of the LTE. …”
    Article
  9. 9

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…Smart grid is an evolution from conventional power grid in which power communication system has migrated from one-way to bi-directional communication network. …”
    text::Thesis
  12. 12
  13. 13

    Performance analysis of downlink scheduling in 3GPP LTE system / Muhammad Haikal Hashim by Hashim, Muhammad Haikal

    Published 2014
    “…In coming years, LTE technology will be widely used by people on their devices such as notebooks, smartphones, gaming devices and video cameras. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Mobility management schemes based on multiple criteria for optimization of seamless handover in long term evolution networks by Hussein, Yassein Soubhi

    Published 2014
    “…The tremendous growth of mobile devices and their attendant applications demand for wireless communication networks supporting high data rates with large capacity. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Bridging the gap: technological innovations and sustainability towards transforming disability products / Norida Abu Bakar … [et al.] by Abu Bakar, Norida, Rashid, Khalidah, Salehuddin, Amirah, Salman, Anis, -, Irdina Khairul Niza, Amir, Zulaikha

    Published 2024
    “…From smart prosthetics equipped with sensor arrays and AI algorithms to wearable devices integrating biofeedback mechanisms, the landscape of assistive technology is undergoing a remarkable evolution. …”
    Get full text
    Get full text
    Get full text
    Book Section
  18. 18

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A complexity-reduced digital predistortion for radio frequency power amplifier by Yousif, Siba Monther

    Published 2016
    “…Power amplifier (PA) is a major source of nonlinearity in a communication system since it often has to operate close to the saturation region to achieve high power efficiency. …”
    Get full text
    Get full text
    Thesis