Search Results - (( java implementation using algorithm ) OR ( wireless communication based algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network by Masud, M.H., Abd Latif, Suhaimi, Anwar, Farhat, Alam, M. K.

    Published 2014
    “…Next generation wireless communication systems are being devised with the vision of heterogeneity where multiple wireless technologies are co-existing. …”
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Investigation of gateway placement optimization approaches in wireless mesh networks using genetic algorithms by M. Ahmed, Awadallah, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina

    Published 2014
    “…In this paper, we study and investigate the efforts of many researchers that dealt with the gateway placement optimization problem based on combinatorial optimization concepts in comparison with other conventional algorithms as well as comparing the combinatorial based algorithms with each other. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Embedded PC based wireless communication using XTEA by Khok, Jess Lyn

    Published 2010
    “…This project presents an embedded cryptosystem for PC based wireless communication using the XTend OEM RF modules. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  6. 6

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A hybrid range-free algorithm using dynamic communication range for wireless sensor networks by Fengrong, Han, Izzeldin Ibrahim, Mohamed Abdelaziz, Xinni, Liu, Kamarul Hawari, Ghazali, Hao, Wang

    Published 2020
    “…Firstly, we applied statistical methods to analyze the relationship between location error and hop count under different communication ranges. Thereafter, we employed centroid algorithm to calculate target node coordinate based on hop threshold. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Cluster optimization in VANET using MFO algorithm and K-Means clustering by Ramlee, Sham Rizal, Hasan, Sazlinah, K. Subramaniam, Shamala

    Published 2023
    “…Wireless Technology is developing very fast. Researchers are actively researching in wireless communication as the technology for wireless communication has been growing quickly. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Analysis and simulation of handoff scenario for wireless communication network / Darul Ridzuan Muhamad Halib by Muhamad Halib, Darul Ridzuan

    Published 2006
    “…This project presents an overview of the handoff scenario for wireless communication network. Handoff is an essential element of wireless communications. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Iterative data detection and channel estimation for single-parity check-product coded MIMO wireless communications system by Muladi, Muladi, Fisal, N., Yusof, S. K.

    Published 2005
    “…In this paper, maximum a posteriori based iterative data detection and pilot symbol assisted channel estimation of the single parity check product code for multiple antenna wireless communication is studied. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Metaheuristic multi-hop clustering optimization for energy-efficient wireless sensor network by Vincent Chung, Norah Tuah, Kit Guan Lim, Min Keng Tan, Ismail Saad, Kenneth Tze Kin Teo

    Published 2020
    “…Energy-efficient optimization algorithm in wireless sensor network (WSN) is often based on solely cluster routing or multi-hop routing. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective by Ul haq, Riaz, Norrozila, Sulaiman, Muhammad, Alam

    Published 2013
    “…Machine learning algorithms are iteration based algorithms, as the new knowledge is based on the previous predicted /calculated knowledge which helps to decrease errors in order to increase efficiency. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book