Search Results - (( java implication based algorithm ) OR ( using communication means algorithm ))
Search alternatives:
- using communication »
- communication means »
- implication based »
- java implication »
- means algorithm »
-
1
Cluster optimization in VANET using MFO algorithm and K-Means clustering
Published 2023“…Improving clustering efficiency by sending frequent updates to the CH in term of improving scalability, coverage, and clustering result, while reducing communication and energy consumption. Overall, the MFO Algorithm and K-Means algorithm can be used in combination to optimize the clustering in VANET, leading to better network performance, more reliable communication, and improved efficiency.…”
Get full text
Get full text
Conference or Workshop Item -
2
-
3
-
4
Dynamic tree-splitting algorithm for massive random access of M2M communications in IoT networks
Published 2021“…The analysis and simulation results show that DTS reduced access delay and increased RACH throughput by approximately 12%, compared to recent benchmarks, with a mean of three preamble transmissions and a success rate above 0.98, which indicates the efficiency and reliability of the proposed algorithm.…”
Get full text
Get full text
Get full text
Article -
5
Noise Cancellation method in assistive listening system
Published 2020“…Those algorithms were Least Means Square, Normalize-Least Means Square, Recursive Least Square, Simple SetMembership Algorithm and Dynamic Set-Membership Affine Projection Algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…We consider two different pilot symbol assisted adaptive beamforming algorithms, Least Mean Square (LMS) and Recursive Least Square (RLS). …”
Get full text
Get full text
Thesis -
7
Securing electrical substation's wireless messaging with a lightweight crypto-algorithm IP core
Published 2023“…We have tested the system with a simplified version of the crypto-algorithm on a VIRTEX evaluation board, using GSM modems communicate over a cellular network. © 2014 IEEE.…”
Conference Paper -
8
A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots
Published 2019“…The main idea in this algorithm is the indirect communication between the ants which is established by the means of pheromones in finding the shortest path between their nest and food [14]. …”
Get full text
Get full text
Monograph -
9
Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim
Published 2007“…They are: 1) Reproduction means the creation of new generations, 2) Crossover means interchanging of parts of parent strings into the child string, and 3) Mutation means the random bit flip. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
Widely linear dynamic quaternion valued least mean square algorithm for linear filtering
Published 2017“…The performance of the proposed algorithms are compared with quaternion least mean square QLMS, zero-attract quaternion least mean square ZA-QLMS, and widely linear quaternion least mean square WL-QLMS algorithms. …”
Get full text
Get full text
Get full text
Thesis -
13
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
Get full text
Get full text
Get full text
Thesis -
14
Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems
Published 2016“…Adaptive algorithms used to estimate the QM’s imperfections, operate either in online or offline mode. …”
Get full text
Get full text
Thesis -
15
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013“…Encryption and decryption algorithm for secure communication depends on the algorithm while the internal structures of the robustness of the mathematics computation depend on the key it uses. …”
Get full text
Get full text
Conference or Workshop Item -
16
Determining prominent research area and expertise from scholarly data using spherical K-Means algorithm and scholar ranking model
Published 2017“…Thus, this study will investigate how the prominent research area can be determined by using Spherical K-Means algorithm to cluster the topics. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
-
18
HYBRID ALGORITHM FOR HAND GESTURE RECOGNITION USING LOCAL GABOR FILTER AND MEL FREQUENCY CEPSTRAL COEFFICIENTS
Published 2014“…Hand gesture is a movement ofhands having meaning to speak, with other people. However, using hand gestures as a medium for communication requires correct recognition of indeed pose and due to this, hand gesture recognition is an active area of research in the vision community. …”
Get full text
Get full text
Thesis -
19
Adaptive beamforming with 16 element linear array using MaxSIR and MMSE algorithms
Published 2007Get full text
Get full text
Get full text
Proceeding Paper -
20
Customer profiling using K-means clustering method / Nik Asyraniasna Nik Mohd Asri
Published 2024“…Through the analysis of various customer data sets, such as people, products, promotion, place, the K-means algorithm can detect clusters that correspond to consistent client groups. …”
Get full text
Get full text
Thesis
