Search Results - (( java implication drops algorithm ) OR ( parameter communication issues algorithm ))

Refine Results
  1. 1
  2. 2

    A new compression algorithm for small data communication in wireless sensor network by Tuama, Ammar Yaseen, Mohamed, Mohamad Afendee, Muhammed, Abdullah, Mohd Hanapi, Zurina

    Published 2017
    “…In this paper, we propose a new lossless compression algorithm that can handle small data communication in WSNs. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    A novel bio-inspired routing algorithm based on ACO for WSNs by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2019
    “…The issue of path selection to reach the nodes and vital correspondence parameters, for example, the versatility of nodes, their constrained vitality, the node residual energy and route length are considered since the communications parameters and imperatives must be taken into account by the imperative systems that mediate in the correspondence procedure, and the focal points of the subterranean insect framework have been utilized furthermore. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Channel selection strategies for co-existence between wimax and wifi by Jong, Siat Ling

    Published 2009
    “…Cognitive radio (CR) is a paradigm for wireless communication in which a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Improving PID controller of motor shaft angular position by using genetic algorithm by Muhamad, Arif Abidin

    Published 2015
    “…This problem among other is affected by existing the nonlinearities component in the system, the system communication noise, and not optimize PID parameter. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach by Gholizadeh, Somayyeh

    Published 2018
    “…This approach tunes the parameters of the linear programming models that are used in the other algorithms by using a dynamic element. …”
    Get full text
    Get full text
    Thesis
  14. 14

    ACCURATE INDOOR POSITION ESTIMATION TECHNIQUE USING FINGERPRINTING AND LATERATION-BASED APPROACH IN BLUETOOTH TECHNOLOGY by SUBHAN, FAZLI

    Published 2012
    “…After selecting the best suitable parameter for position estimation, the next issue is to address the distance estimation error and identify its causes. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Mobility management schemes based on multiple criteria for optimization of seamless handover in long term evolution networks by Hussein, Yassein Soubhi

    Published 2014
    “…The results demonstrated that our proposed method results in significant reductions of HOF, HOPP and packet loss ratio (PLR) compared to the conventional HHO and enhanced weighted performance HO parameter optimization (EWPHPO) algorithm. The results also show that the reduction of HOF through FuzAMP over conventional HHO algorithm is approximately 60%, 65%, and 66% at 3, 30, and 120 km/h, respectively, and over EWPHPO algorithm is approximately 30%, 46%, and 50% at 3, 30, and 120 km/h, respectively. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Elgamal digital signature scheme with integrated CFEA-technique by Arif Mandangan, Che Haziqah Che Hussin, Chang, Ee Hung

    Published 2016
    “…Authentication is a mechanism to ensure that we are communicating with the intended party. If Alice and Bob want to communicate securely, then the authentication mechanism will be able to ensure that Alice is truly communicating with Bob, and Bob is truly communicating with Alice. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Elgamal Digital Signature Scheme With Integrated CFEA-Technique by Arif Mandangan, Che Haziqah Che Hussin, Chang Ee Hung

    Published 2016
    “…Authentication is a mechanism to ensure that we are communicating with the intended party. If Alice and Bob want to communicate securely, then the authentication mechanism will be able to ensure that Alice is truly communicating with Bob, and Bob is truly communicating with Alice. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhancing quality of service in Multi-Radio Multi-Channel Wireless Mesh Networks by Raja Bongsu, Raja Hasyifah

    Published 2023
    “…The Priority-based Minimum Interference Channel Assignment (PRIMICA) algorithm is introduced to address this issue. PRIMICA assigns distinct frequency channels to each radio, significantly reducing interference, packet loss, delay and ultimately enhancing QoS. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20