Search Results - (( using codification using algorithm ) OR ( basic communication based algorithm ))
Search alternatives:
- basic communication »
- communication based »
- using codification »
- codification using »
- using algorithm »
-
1
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
2
-
3
A hybrid range-free algorithm using dynamic communication range for wireless sensor networks
Published 2020“…Firstly, we applied statistical methods to analyze the relationship between location error and hop count under different communication ranges. Thereafter, we employed centroid algorithm to calculate target node coordinate based on hop threshold. …”
Get full text
Get full text
Get full text
Article -
4
Efficient transmission based on genetic evolutionary algorithm
Published 2022“…In this paper, an energy-saving mechanism based on genetic algorithm in wireless sensor network (WSN) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
5
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
6
Communication and computational cost on parallel algorithm of PDE elliptic type
Published 2009Get full text
Get full text
Book Section -
7
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…It is one of the key approaches that has revolutionized communication and is the basis of the 5G network. D2D allows small devices such as mobile phones, tablets to act as Non-transparent relays (NTR) where they can provide services as well as forward traffic, request or services besides basic function that is direct communication without the need of Base Station (BS). …”
Get full text
Get full text
Thesis -
8
Butterfly Triple System Algorithm Based on Graph Theory
Published 2022Get full text
Get full text
Get full text
Article -
9
Noise Cancellation method in assistive listening system
Published 2020“…Those algorithms were Least Means Square, Normalize-Least Means Square, Recursive Least Square, Simple SetMembership Algorithm and Dynamic Set-Membership Affine Projection Algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Research on the construction of English intelligent classroom based on Artificial Intelligence
Published 2018“…Due to the uncertainty of emotions, traditional machine learning algorithms may not handle this uncertain inference problem well while probability theory provides us with the basic foundation to model the uncertainty of emotions. …”
Get full text
Get full text
Article -
11
Ant system with heuristics for capacitated vehicle routing problem
Published 2013“…The ASH algorithm is basically applied with its probabilistic decision rule and pheromone feedback to construct the sequences of customers to be visited in the CVRP solution. …”
Get full text
Get full text
Thesis -
12
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
Get full text
Get full text
Get full text
Article -
13
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
Get full text
Get full text
Get full text
Article -
14
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…Basically, the QEEA is based on the Time Domain (TD) and Frequency Domain (FD) scheduling where it is dependent on the QoS requirements to allocate resources. …”
Get full text
Get full text
Thesis -
15
Trust‑based lightweight security protocol for device to device multihop cellular communication (TLwS)
Published 2021“…Besides basic function that is direct communication without the need of Base Station (BS), D2D allows small communicating device to act as intermediate device not only for forward the trafcs but also permits the sharing of resources such as spectrum, services, data and social contents for any users that are near the proximity range. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
The design and applications of the african buffalo algorithm for general optimization problems
Published 2017“…Based on the successful experimentation with the novel algorithm, it is safe to conclude that the ABO is a worthy contribution to the scientific literature.…”
Get full text
Get full text
Thesis -
17
Development of a novel fault management in distribution system using distribution automation system in conjunction with GSM communication
Published 2013“…The proposed fault management system is design based on GSM (global system for mobile) communication. …”
Get full text
Get full text
Article -
18
-
19
On spectral efficiency maximization in a partial joint processing system using a multi-start particle swarm optimization algorithm
Published 2015Get full text
Get full text
Conference or Workshop Item -
20
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…Machine learning algorithms are iteration based algorithms, as the new knowledge is based on the previous predicted /calculated knowledge which helps to decrease errors in order to increase efficiency. …”
Get full text
Get full text
Conference or Workshop Item
