Search Results - (( java implication based algorithm ) OR ( using communication using (algorithmic OR algorithms) ))

Refine Results
  1. 1

    Dynamic communication performance enhancement in hierarchical torus network by selection algorithm by Rahman, M.M. Hafizur, Sato, Yukinori, Inoguchi, Yasushi

    Published 2012
    “…It is found that the dynamic communication performance of an HTN using these adaptive routing algorithms are better than when the dimension-order routing is used, in terms of network throughput. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Routing performance enhancement in hierarchical torus network by link-selection algorithm by Rahman, M.M. Hafizur, Horiguchi, Susumu

    Published 2005
    “…We find that the dynamic communication performance of an HTN using the link-selection algorithm is better than when the dimension-order routing algorithm is used.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Dynamic communication performance enhancement in Hierarchical Torus Network by selection algorithm by Rahman, M.M. Hafizur, Sato, Yukinori, Inoguchi, Yasushi

    Published 2010
    “…The dynamic communication performances of an HTN is evaluated by using dimension-order routing and proposed adaptive routing algorithms under various traffic patterns. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Adaptive routing algorithms and implementation for TESH network by Miura, Yasuyuki, Kaneko, Masahiro, Rahman, M.M. Hafizur, Watanabe, Shigeyoshi

    Published 2013
    “…It is found that the communication performance of a TESH network using these adaptive algorithms is better than when the dimension-order routing algorithm is used.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…In a conclusion, SEM prototype and adaptive communication data transfer algorithm with a combination of the three communication will be another method to solve a single communication problem of SM and suitable in residential location that offered the proposed communication infrastructure.…”
    Get full text
    Get full text
    Thesis
  7. 7

    A new compression algorithm for small data communication in wireless sensor network by Tuama, Ammar Yaseen, Mohamed, Mohamad Afendee, Muhammed, Abdullah, Mohd Hanapi, Zurina

    Published 2017
    “…In this paper, we propose a new lossless compression algorithm that can handle small data communication in WSNs. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Butterfly traffic pattern in selection algorithm on hierarchical torus network by Rahman, M.M. Hafizur, Akhand, M. A. H, Shill, P.C., Inoguchi, Yasushi

    Published 2015
    “…It is found that the dynamic communication performance of an HTN using the LS+CS algorithm is better than when the dimension-order routing is used.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10
  11. 11

    Enhannced sampling algorithm in bluetooth low energy for indoor localization by Mat Daud, Mohd Faiz

    Published 2018
    “…These network mainly used for communication and data exchange. However, it is also being used to acquired one’s or device’s position with certain accuracy. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Improving pipelined time stepping algorithm for distributed memory multicomputers by Ng, Kok Fu, Norhashidah Hj. Mohd. Ali

    Published 2010
    “…We present a modified pipelined time stepping algorithm based on delayed pipelining and reduced communication strategies to improve overall execution time on a distributed memory environment using MPI. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Bitwise-based Routing Algorithms in Optical Multistage Interconnection Network by Abed, Farzaneh

    Published 2007
    “…Under the constraint of avoiding crosstalk, the interests of these algorithms are to find a permutation that uses a minimum number of passes and minimum execution time. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Cluster optimization in VANET using MFO algorithm and K-Means clustering by Ramlee, Sham Rizal, Hasan, Sazlinah, K. Subramaniam, Shamala

    Published 2023
    “…Improving clustering efficiency by sending frequent updates to the CH in term of improving scalability, coverage, and clustering result, while reducing communication and energy consumption. Overall, the MFO Algorithm and K-Means algorithm can be used in combination to optimize the clustering in VANET, leading to better network performance, more reliable communication, and improved efficiency.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Variable Global Optimization min-sum (VGOMS) algorithm of decode-and forward-protocol for the relay node in the cooperative channel by Hushairi, Zen, Al-Khalid, Hj Othman, Khairuddin, Abdul Hamid, Jamaah, Suut

    Published 2020
    “…The proposed system model uses the channel combining large-scale and small-scale effects which used extensively in cooperative communications. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Comparison analysis of stream cipher algorithms for digital communication by Mat Sidek, Abd. Rahim, Sha'ameri, Ahmad Zuri

    Published 2007
    “…By using a common key length and worst case conditions, the strength of several stream cipher algorithms are evaluated using statistical tests, correlation attack, linear complexity profile and nonstandard test. …”
    Get full text
    Get full text
    Get full text
    Article