Search Results - (( java implication based algorithm ) OR ( knowledge communication system algorithm ))
Search alternatives:
- knowledge communication »
- implication based »
- java implication »
- system algorithm »
-
1
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014Get full text
Get full text
Undergraduates Project Papers -
2
Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin
Published 2006“…A large pool of data requires not only an efficient and effective retrieval system but also a better way to discover hidden knowledge. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
Get full text
Get full text
Get full text
Thesis -
5
Speed and Angle Estimation of Mobile Terminal in Distributed Antenna Systems
Published 2010“…In the wireless mobile communications the knowledge of the mobile speed and/or the mobile velocity is of great importance because it is very helpful in the development of the system management algorithms (i.e. the handoff algorithms). …”
Get full text
Get full text
Conference or Workshop Item -
6
Medical sign language translator in healthcare facility using yolo version 7 algorithm / Nurin Qistina Zaini
Published 2023“…In addition, people who work worked at a front desk in healthcare institutions also have a limited knowledge on this sign language. Hence, this creates barrier for these impairment people to do communication in their daily activities, especially when dealing at the healthcare facility. …”
Get full text
Get full text
Thesis -
7
Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems
Published 2018“…The ever-increasing demand for high-data-rate communication over a wireless multipath fading channel usually necessitates that at the receiver, prior knowledge about the channel is known. …”
Get full text
Get full text
Thesis -
8
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…The Random Tree relay algorithm model presented an improved average trip decision time of 18 ms compared with the standard minimum value of 20 ms recorded for the conventional relay due to eliminated communication channels. …”
Get full text
Get full text
Thesis -
9
The Security Level Of Two Xored-based A5 Crypto System
Published 2024“…It was at first kept secret, but became open knowledge through leaks and reverse engineering. The purpose of this paper is to compare the security level of two (2) XORed-based A5 crypto systems. …”
Article -
10
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
11
Norms detection and assimilation in multi-agent systems: a conceptual approach
Published 2012Get full text
Book Section -
12
Improved Dynamic Ant Colony System (DACS) on Symmetric Traveling Salesman Problem (TSP).
Published 2007“…Their ability as a colony to find paths or routes to the food sources has inspired the development of an algorithm namely Ant Colony System (ACS). The principle of cooperation has been the backbone in these algorithmic developments. …”
Get full text
Get full text
Conference or Workshop Item -
13
Implementing universal priority DBA algorithm in PIC based EPON testbed
Published 2023“…For proof-of-concept, the UDBA algorithm is implemented inside a proposed peripheral interface controller (PIC) based EPON testbed in order to evaluate the communication protocol involved. …”
Article -
14
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
High performance simulation for brain tumors growth using parabolic equation on heterogeneous parallel computer systems
Published 2007“…Parallel Virtual Machine (PVM) is emphasized as communication platform in parallel computer systems. …”
Get full text
Get full text
Article -
16
High performance visualization of human tumor growth software
Published 2008“…Parallel Virtual Machine (PVM) is emphasized as communication platform in parallel computer systems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
An investigation of scheduling and packet reordering algorithms for bandwidth aggregation in heterogeneous wireless networks
Published 2013“…This paper aims to investigate the common scheduling algorithms both adaptive and non-adaptive solutions that have been using in networking and communication field. …”
Get full text
Get full text
Get full text
Article -
18
GPS-less Localization Protocol for Underwater Acoustic Networks
Published 2008Get full text
Get full text
Get full text
Article -
19
High performance simulation for brain tumours growth using parabolic equation on heterogeneous parallel computer system
Published 2007“…Parallel Virtual Machine (PVM) is emphasized as communication platform in parallel computer systems. …”
Get full text
Get full text
Get full text
Article -
20
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
Get full text
Get full text
Thesis
