Search Results - (( processes specification protocol algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication by JAM'AAH, SUUD

    Published 2021
    “…Besides that by using LDPC code the decoding processing time can be reduced. The limitation of the available works on min-sum based LDPC code decoding algorithm specifically for DF protocol relay system motivated this research. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Faulty processes may cause some other active processes to become inactive during the queuing or within the using a critical section time. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol by Pirborj, Nesae Mouzehkesh

    Published 2009
    “…Therefore effective techniques in order to reduce the probability of collisions while contending for the medium can be established in a MAC protocol for it organizes the specific time slot a node can have access to the channel. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A self-adaptive agent-based simulation modelling framework for dynamic processes by Ling, Loo Yim, Dr.

    Published 2023
    “…Agent-based simulation (ABS) modelling had been a prevalent approach for simulation of dynamic processes of various domains. Construction of ABS models are usually in the form of domain-specific for dynamic process simulation objectives. …”
    text::Thesis
  6. 6

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…This framework provides a sound formalization for the authentication problem and suggests simple and attractive design principles for general authentication protocols. The general approach uses trusted devices (specifically smartcards) to provide an area of secure processing and storage. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring by Al-Mekhlafi, Mohamed Abdulkarem Taher

    Published 2021
    “…Some of these challenges result from the transmission of huge amounts of data in each data sensing period and the complexity of SHM algorithms. Furthermore, in WSNs, the operating system (OS) with its network protocol stack and media access control (MAC) layer protocol play an essential role in managing the scarce resources, data processing and communication. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Bat optimized link state routing protocol for energy-aware mobile ad-hoc networks by Jubair M.A., Mostafa S.A., Muniyandi R.C., Mahdin H., Mustapha A., Hassan M.H., Mahmoud M.A., Al-Jawhar Y.A., Al-Khaleefa A.S., Mahmood A.J.

    Published 2023
    “…The symmetry between OLSR of MANET and Bat Algorithm (BA) is that both of them use the same mechanism for finding the path via sending and receiving specific signals. …”
    Article
  10. 10

    Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications by IZZAH NILAMSYUKRIYAH, BUANG, Kartinah, Zen, Syahrul Nizam, Junaini

    Published 2025
    “…Abstract: The proliferation of Internet of Things (IoT) applications has significantly increased the demand for communication protocols that are both resilient and energy-efficient. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    A generator of cauchy-distributed time series with specific Hurst index by Estrada-Vargas, Leopoldo, Toral-Cruz, Homero, Pathan, Al-Sakib Khan

    Published 2011
    “…The input location, scale and Hurst index used in the simulations are taken from jitter samples of monitored Voice over Internet Protocol (VoIP) calls, which have been proved to be adequately modeled with these processes under some circumstances.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…The suggested ShiftRows algorithm utilises DNA-specific characteristics of the nucleotides {A, T, G, C}. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A hybrid residue based sequential encoding mechanism with XGBoost improved ensemble model for identifying 5-hydroxymethylcytosine modifications by Uddin I., Awan H.H., Khalid M., Khan S., Akbar S., Sarker M.R., Abdolrasol M.G.M., Alghamdi T.A.H.

    Published 2025
    “…To address this challenge, the paper proposed XGB5hmC, a machine learning algorithm based on a robust gradient boosting algorithm (XGBoost), with different residue based formulation methods to identify 5hmC samples. …”
    Article
  17. 17

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…The simulation process was conducted using Network Simulator-3 (NS-3) and the performance of these packet scheduling algorithms were evaluated based on the performance metrics of throughput, delay, packet loss ratio (PLR), energy consumption rate (ECR), and EE for the voice over IP (VoIP), video and File Transfer Protocol (FTP) applications. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A comprehensive analysis of surface electromyography for control of lower limb exoskeleton by Abdelhakim, Deboucha

    Published 2016
    “…The RMSE for both protocols were relatively low varying between 6.88 and 8.31. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Design a new proposed route optimization scheme based NEMO-Centric MANEMO (NCM) by Mousa, Ahmed A., Hassan Abdalla Hashim, Aisha, Khateeb, Khalid Al, Khalifa, Othman Omran, Adibah, Huda Adibah

    Published 2014
    “…This paper discusses the RO issues for NEMO and more specifically issues of Nested NEMO such astunneling redundant, HA dependency, processing delay, bottleneck, traffic congestion, ER selection, and scalability in the design consideration. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic by Mohammed, Athraa Jasim

    Published 2012
    “…The blogs search engine consists of three main phases which are crawling using RSS feeds algorithm, indexing weblogs algorithm and searching technique with Fuzzy logic. …”
    Get full text
    Get full text
    Get full text
    Thesis