Search Results - (( java implication based algorithm ) OR ( using communication means algorithm ))

Refine Results
  1. 1

    Cluster optimization in VANET using MFO algorithm and K-Means clustering by Ramlee, Sham Rizal, Hasan, Sazlinah, K. Subramaniam, Shamala

    Published 2023
    “…Improving clustering efficiency by sending frequent updates to the CH in term of improving scalability, coverage, and clustering result, while reducing communication and energy consumption. Overall, the MFO Algorithm and K-Means algorithm can be used in combination to optimize the clustering in VANET, leading to better network performance, more reliable communication, and improved efficiency.…”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3
  4. 4

    Dynamic tree-splitting algorithm for massive random access of M2M communications in IoT networks by Althumali, Huda, Othman, Mohamed, Noordin, Nor Kamariah, Mohd Hanapi, Zurina

    Published 2021
    “…The analysis and simulation results show that DTS reduced access delay and increased RACH throughput by approximately 12%, compared to recent benchmarks, with a mean of three preamble transmissions and a success rate above 0.98, which indicates the efficiency and reliability of the proposed algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Noise Cancellation method in assistive listening system by Noor Aliff, Noor Affande

    Published 2020
    “…Those algorithms were Least Means Square, Normalize-Least Means Square, Recursive Least Square, Simple SetMembership Algorithm and Dynamic Set-Membership Affine Projection Algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems by Subramaniam, Jeevan Rao

    Published 2006
    “…We consider two different pilot symbol assisted adaptive beamforming algorithms, Least Mean Square (LMS) and Recursive Least Square (RLS). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Securing electrical substation's wireless messaging with a lightweight crypto-algorithm IP core by Abbas Y.A., Jidin R., Jami N., Z'aba M.R.

    Published 2023
    “…We have tested the system with a simplified version of the crypto-algorithm on a VIRTEX evaluation board, using GSM modems communicate over a cellular network. © 2014 IEEE.…”
    Conference Paper
  8. 8

    A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots by Ismail, Amelia Ritahani, Tumian, Afidalina

    Published 2019
    “…The main idea in this algorithm is the indirect communication between the ants which is established by the means of pheromones in finding the shortest path between their nest and food [14]. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim by Hashim, Siti Zuraifah

    Published 2007
    “…They are: 1) Reproduction means the creation of new generations, 2) Crossover means interchanging of parts of parent strings into the child string, and 3) Mutation means the random bit flip. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…The performance of the proposed algorithms are compared with quaternion least mean square QLMS, zero-attract quaternion least mean square ZA-QLMS, and widely linear quaternion least mean square WL-QLMS algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff by Fatin Nabila , Abd Latiff

    Published 2021
    “…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems by Talebpour, Faraz

    Published 2016
    “…Adaptive algorithms used to estimate the QM’s imperfections, operate either in online or offline mode. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Network Security Encryption Techniques for Reliablility Data Transmission on Password System by Norrozila, Sulaiman, Ng, Liang Shen, M. A., Ameedeen

    Published 2013
    “…Encryption and decryption algorithm for secure communication depends on the algorithm while the internal structures of the robustness of the mathematics computation depend on the key it uses. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Determining prominent research area and expertise from scholarly data using spherical K-Means algorithm and scholar ranking model by Sarasjati, Wendy

    Published 2017
    “…Thus, this study will investigate how the prominent research area can be determined by using Spherical K-Means algorithm to cluster the topics. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    HYBRID ALGORITHM FOR HAND GESTURE RECOGNITION USING LOCAL GABOR FILTER AND MEL FREQUENCY CEPSTRAL COEFFICIENTS by GUPTA, SHIKHA

    Published 2014
    “…Hand gesture is a movement ofhands having meaning to speak, with other people. However, using hand gestures as a medium for communication requires correct recognition of indeed pose and due to this, hand gesture recognition is an active area of research in the vision community. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Customer profiling using K-means clustering method / Nik Asyraniasna Nik Mohd Asri by Nik Mohd Asri, Nik Asyraniasna

    Published 2024
    “…Through the analysis of various customer data sets, such as people, products, promotion, place, the K-means algorithm can detect clusters that correspond to consistent client groups. …”
    Get full text
    Get full text
    Thesis