Search Results - (( java implication based algorithm ) OR ( knowledge communication system algorithm ))

Refine Results
  1. 1
  2. 2

    Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin by Latiffah, A. Noor, Nordin, A. B.

    Published 2006
    “…A large pool of data requires not only an efficient and effective retrieval system but also a better way to discover hidden knowledge. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff by Fatin Nabila , Abd Latiff

    Published 2021
    “…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Speed and Angle Estimation of Mobile Terminal in Distributed Antenna Systems by Jeoti , Varun

    Published 2010
    “…In the wireless mobile communications the knowledge of the mobile speed and/or the mobile velocity is of great importance because it is very helpful in the development of the system management algorithms (i.e. the handoff algorithms). …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Medical sign language translator in healthcare facility using yolo version 7 algorithm / Nurin Qistina Zaini by Zaini, Nurin Qistina

    Published 2023
    “…In addition, people who work worked at a front desk in healthcare institutions also have a limited knowledge on this sign language. Hence, this creates barrier for these impairment people to do communication in their daily activities, especially when dealing at the healthcare facility. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems by Uwaechia, Anthony Ngozichukwuka

    Published 2018
    “…The ever-increasing demand for high-data-rate communication over a wireless multipath fading channel usually necessitates that at the receiver, prior knowledge about the channel is known. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line by Olufemi, Osaji Emmanuel

    Published 2020
    “…The Random Tree relay algorithm model presented an improved average trip decision time of 18 ms compared with the standard minimum value of 20 ms recorded for the conventional relay due to eliminated communication channels. …”
    Get full text
    Get full text
    Thesis
  9. 9

    The Security Level Of Two Xored-based A5 Crypto System by Nur Hafiza Zakaria, Kamaruzzaman Seman, Ismail Abdullah

    Published 2024
    “…It was at first kept secret, but became open knowledge through leaks and reverse engineering. The purpose of this paper is to compare the security level of two (2) XORed-based A5 crypto systems. …”
    Article
  10. 10

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Improved Dynamic Ant Colony System (DACS) on Symmetric Traveling Salesman Problem (TSP). by Md Rais, Helmi, Ali Othman, Zulaiha, Hamdan, Abdul Razak

    Published 2007
    “…Their ability as a colony to find paths or routes to the food sources has inspired the development of an algorithm namely Ant Colony System (ACS). The principle of cooperation has been the backbone in these algorithmic developments. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Implementing universal priority DBA algorithm in PIC based EPON testbed by Radzi N.A.M., Din N.M., Al-Mansoori M.H., Majid M.S.A., Abdullah F.

    Published 2023
    “…For proof-of-concept, the UDBA algorithm is implemented inside a proposed peripheral interface controller (PIC) based EPON testbed in order to evaluate the communication protocol involved. …”
    Article
  14. 14

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    High performance simulation for brain tumors growth using parabolic equation on heterogeneous parallel computer systems by Pheng, H. S., Alias, Norma, Mohd. Said, Norfarizan

    Published 2007
    “…Parallel Virtual Machine (PVM) is emphasized as communication platform in parallel computer systems. …”
    Get full text
    Get full text
    Article
  16. 16

    High performance visualization of human tumor growth software by Alias, Norma, Mohd. Said, Norfarizan, Khalid, Siti Nur Hidayah, Sin, Dolly Tien Ching, Phang, Tau Ing

    Published 2008
    “…Parallel Virtual Machine (PVM) is emphasized as communication platform in parallel computer systems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    An investigation of scheduling and packet reordering algorithms for bandwidth aggregation in heterogeneous wireless networks by Latif, Suhaimi A, Masud, Mosharrof Hussain, Anwar, Farhat, Alam, Md Khorshed

    Published 2013
    “…This paper aims to investigate the common scheduling algorithms both adaptive and non-adaptive solutions that have been using in networking and communication field. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    High performance simulation for brain tumours growth using parabolic equation on heterogeneous parallel computer system by Pheng H. S., Norma Alias, Norfarizan Mohd Said

    Published 2007
    “…Parallel Virtual Machine (PVM) is emphasized as communication platform in parallel computer systems. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
    Get full text
    Get full text
    Thesis