Search Results - (( processes specifications protocol algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- processes specifications »
- customization algorithm »
- protocol algorithm »
- java application »
-
1
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…Besides that by using LDPC code the decoding processing time can be reduced. The limitation of the available works on min-sum based LDPC code decoding algorithm specifically for DF protocol relay system motivated this research. …”
Get full text
Get full text
Get full text
Thesis -
2
New synchronization protocol for distributed system with TCP extension
Published 2013“…Faulty processes may cause some other active processes to become inactive during the queuing or within the using a critical section time. …”
Get full text
Get full text
Thesis -
3
-
4
Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol
Published 2009“…Therefore effective techniques in order to reduce the probability of collisions while contending for the medium can be established in a MAC protocol for it organizes the specific time slot a node can have access to the channel. …”
Get full text
Get full text
Thesis -
5
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Agent-based simulation (ABS) modelling had been a prevalent approach for simulation of dynamic processes of various domains. Construction of ABS models are usually in the form of domain-specific for dynamic process simulation objectives. …”
text::Thesis -
6
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…This framework provides a sound formalization for the authentication problem and suggests simple and attractive design principles for general authentication protocols. The general approach uses trusted devices (specifically smartcards) to provide an area of secure processing and storage. …”
Get full text
Get full text
Thesis -
7
Automated multi-agent negotiation framework for the construction domain
Published 2023Conference Paper -
8
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Some of these challenges result from the transmission of huge amounts of data in each data sensing period and the complexity of SHM algorithms. Furthermore, in WSNs, the operating system (OS) with its network protocol stack and media access control (MAC) layer protocol play an essential role in managing the scarce resources, data processing and communication. …”
Get full text
Get full text
Thesis -
9
Bat optimized link state routing protocol for energy-aware mobile ad-hoc networks
Published 2023“…The symmetry between OLSR of MANET and Bat Algorithm (BA) is that both of them use the same mechanism for finding the path via sending and receiving specific signals. …”
Article -
10
Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications
Published 2025“…Abstract: The proliferation of Internet of Things (IoT) applications has significantly increased the demand for communication protocols that are both resilient and energy-efficient. …”
Get full text
Get full text
Get full text
Article -
11
Protein microarray-based IgE immunoassay for allergy diagnosis
Published 2017Get full text
Get full text
Book Section -
12
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
13
-
14
A generator of cauchy-distributed time series with specific Hurst index
Published 2011“…The input location, scale and Hurst index used in the simulations are taken from jitter samples of monitored Voice over Internet Protocol (VoIP) calls, which have been proved to be adequately modeled with these processes under some circumstances.…”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The suggested ShiftRows algorithm utilises DNA-specific characteristics of the nucleotides {A, T, G, C}. …”
Get full text
Get full text
Thesis -
16
A hybrid residue based sequential encoding mechanism with XGBoost improved ensemble model for identifying 5-hydroxymethylcytosine modifications
Published 2025“…To address this challenge, the paper proposed XGB5hmC, a machine learning algorithm based on a robust gradient boosting algorithm (XGBoost), with different residue based formulation methods to identify 5hmC samples. …”
Article -
17
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…The simulation process was conducted using Network Simulator-3 (NS-3) and the performance of these packet scheduling algorithms were evaluated based on the performance metrics of throughput, delay, packet loss ratio (PLR), energy consumption rate (ECR), and EE for the voice over IP (VoIP), video and File Transfer Protocol (FTP) applications. …”
Get full text
Get full text
Thesis -
18
A comprehensive analysis of surface electromyography for control of lower limb exoskeleton
Published 2016“…The RMSE for both protocols were relatively low varying between 6.88 and 8.31. …”
Get full text
Get full text
Thesis -
19
Design a new proposed route optimization scheme based NEMO-Centric MANEMO (NCM)
Published 2014“…This paper discusses the RO issues for NEMO and more specifically issues of Nested NEMO such astunneling redundant, HA dependency, processing delay, bottleneck, traffic congestion, ER selection, and scalability in the design consideration. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic
Published 2012“…The blogs search engine consists of three main phases which are crawling using RSS feeds algorithm, indexing weblogs algorithm and searching technique with Fuzzy logic. …”
Get full text
Get full text
Get full text
Thesis
