Search Results - (( process communication devices algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Development of seven segment display recognition using TensorFlow on Raspberry Pi by Gunawan, Teddy Surya, Mohammad Reduwan, Haque, Yaacob, Mashkuri, Mohamed Azmin, Nor Fadhillah, Ismail, Nanang, Ismail, Md Yusof, Kartiwi, Mira, A. Rahman, Azhar

    Published 2022
    “…To facilitate industrial automation, the previous process's displayed information must be recognized as the input to the subsequent process, even more so when direct communication between processes is not visible. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Genetic algorithm based adaptive offloading for improving IoT device communication efficiency by Hussain, Azham, Manikanthan, S. V., Padmapriya, T., Nagalingam, Mahendran

    Published 2019
    “…With an extended support from cloud network, the mobile IoT devices demand flexibility and scalability in communication. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication by Yasir, Javed

    Published 2020
    “…Device to Device (D2D) communication has gained a lot of popularity in recent years as it offers high speed, extended coverage, and ubiquitous connectivity. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Performance analysis of constrained device virtualization algorithm by Haseeb, Shariq, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ismail, Ahmad Faris

    Published 2020
    “…Due to their limited capabilities, the constrained devices usually host proprietary protocols, platforms, data formats and data structures for communications and therefore, are unable to communicate with devices from different vendors. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Blockchain based security framework for device authentication and data communication in decentralized IoT network by Alahmed, Mahmoud Tayseer

    Published 2023
    “…First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications by Rafique, Majid

    Published 2025
    “…By locating itself closer to edge devices, fog computing enhances data processing. This proximity reduces latency, energy consumption, and communication costs while improving real-time response capabilities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network by Rashad Mahmood, Saqib, Adnan Shahid, Khan

    Published 2022
    “…Device to Device (D2D) communication is a type of technology where two devices can communicate directly with each other without the need to contact Base Station or any central infrastructure. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A modified group authentication scheme for machine type communication in LTE/LTE-a networks by Ismail, Haqi Khalid

    Published 2018
    “…High signalling congestion occurs during the verification phase since every MTC device needs to go through a full authentication process. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems by Talebpour, Faraz

    Published 2016
    “…Like other electronics devices, wireless communication systems are not immune to such imperfections. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Biologically Inspired Network on Chip Fault Tolerant Algorithm Using Time Division Multiplexing by Sethi, Muhammad Athar Javed, Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…Due to the advanced nanoscale manufacturing processes and the complex communication requirements of the processing elements (PEs) various faults have occurred on NoC. …”
    Get full text
    Get full text
    Conference or Workshop Item