Search Results - (( java implementation phase algorithm ) OR ( using network coding algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- coding algorithm »
- phase algorithm »
- network coding »
-
1
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
Get full text
Get full text
Thesis -
2
Genetic algorithm based network coding in wireless ad hoc networks
Published 2013“…Wireless network simulation is used to demonstrate and assess the implementation of network coding in wireless ad hoc networks. …”
Get full text
Get full text
Get full text
Thesis -
3
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
4
Evolutionary algorithm based network coding for optmization of intelligent vehicular ad hoc network
Published 2017“…This project aims to improve the throughput, energy consumption and overhead of vehicular ad hoc network (VANET) by optimising the network coding (NC) using Genetic Algorithm and Particle Swarm Optimisation (GA-PSO). …”
Get full text
Get full text
Thesis -
5
Exploration of genetic algorithm in network coding for wireless sensor networks
Published 2014“…Hence, genetic algorithm is used to optimize the resources for network coding. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
A genetic algorithm for management of coding resources in VANET
Published 2017“…This project aims to improve the throughput, energy consumption and overhead of vehicular ad hoc network (VANET) by optimising the network coding (NC) using Genetic Algorithm (GA). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…These algorithm are used to produce chain code series that represented a thinned binary image of the sketch. …”
Get full text
Get full text
Monograph -
8
-
9
Evolutionary algorithm based network coding for optimization of intelligent vehicular ad hoc network
Published 2017“…This project aims to improve the throughput, energy consumption and overhead of vehicular ad hoe network (VANET) by optimising the network coding (NC) using Genetic Algorithm and Particle Swarm Optimisation (GA-PSO). …”
Get full text
Get full text
Get full text
Thesis -
10
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…The Differential Services Code Point within the Differentiated Service (DiffServ) field is primarily used inside the Layer 3 encapsulated network IP packets. …”
Get full text
Get full text
Get full text
Article -
11
Artificial intelligent power prediction for efficient resource management of WCDMA mobile network
Published 2023“…The output of SVR will be used by WCDMA mobile network to decide on new service admission. …”
Conference Paper -
12
Multilayers fast mode decision algorithm for scalable video coding: design, implementation, and streaming evaluation on IEEE 802.11g wireless LAN
Published 2011“…The advancement and development in video coding technology, together with the increase of storage capacity network infrastructures and computing power are enabling an increasing number of video applications. …”
Get full text
Get full text
Book -
13
Optimization of coded signals based on wavelet neural network
Published 2015“…We performed evaluation using 13-bit, 35-bit and 69-bit Barker codes as signal codes to WNN. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Development of new code for optical code division multiple access systems
Published 2011“…Splitting algorithm is proposed to construct the new code families namely RD code. …”
Get full text
Thesis -
15
Design of information hiding algorithm for multi-link network transmission channel
Published 2019“…This paper designs an information hiding algorithm for multi-link network transmission channel based on secondary positioning, it uses RS code M public key cryptosystem to pre-process secret information and improve the security of information; calculates the upper limit of hiding capacity of multi-link network transmission channel system through information hiding capacity analysis model, and determines whether the hiding capacity exceeds the secret information. …”
Get full text
Get full text
Get full text
Article -
16
Neural network-based codebook search for image compression
Published 2000“…The image to be coded is first clustered into a small subset of neighboring images and then the neural network-based encoder is used to find the best matching code sequences in the codebook. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
An effective transmit packet coding with trust-based relay nodes in VANETs
Published 2020“…With network coding, the number of transmitted packets over the network can be reduced, ensuring efficient utilization of network devices and resources. …”
Get full text
Get full text
Get full text
Article -
18
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
