Search Results - (( using codification using algorithm ) OR ( basic communication issues algorithm ))
Search alternatives:
- communication issues »
- basic communication »
- using codification »
- codification using »
- issues algorithm »
- using algorithm »
-
1
-
2
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
3
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…This concept of multihop D2D communication has introduced a number of issues that were non-prevalent in current cellular communication. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…For the proliferation of wireless sensor network, in different environments, an escalation in the lifetime of wireless sensors is mandatory, because among the basic issues concerning WSN is a successful effort to document the coverage of the number of target fields, while maximizing the lifetime of this network. …”
Article -
7
Position-based QoS multicast routing protocol for mobile Ad Hoc Networks
Published 2010“…For group-oriented multimedia applications Quality of Service (QoS) provision is a basic requirement, which makes an efficient QoS multicast routing protocol a very important issue. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
On spectral efficiency maximization in a partial joint processing system using a multi-start particle swarm optimization algorithm
Published 2015Get full text
Get full text
Conference or Workshop Item -
9
Improving PID controller of motor shaft angular position by using genetic algorithm
Published 2015“…This problem among other is affected by existing the nonlinearities component in the system, the system communication noise, and not optimize PID parameter. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
The enhanced fault-tolerant AODV routing protocol for Wireless Sensor Network
Published 2010“…Basically, wireless sensor networks suffer from resource limitations, high failure rates and faults caused by the defective nature of wireless communication and the wireless sensor itself. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Enhanced Mobility Solution In Mobile Ipv6 Network
Published 2008“…Enhanced Mobility Solution in Mobile IPv6 Network is extremely complex; the study addressed the multihoming issues of MIPV6 Networks on the basis of NEMO Basic Support, analyzes the benefits of multihoming and discusses implementation issues of all classes of multihoming possibilities. …”
Get full text
Get full text
Thesis -
13
-
14
Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani
Published 2015“…In case of multiple filterbanks the cepstral features are used in different experts for performing classification based on different representation of speeches. …”
Get full text
Get full text
Thesis -
15
-
16
Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil
Published 2024“…Hence, the development of real-time baby sign language recognition on mobile platforms could help to address these issues. This research will focus only on six basic baby sign languages that are commonly used in daily life. …”
Get full text
Get full text
Get full text
Article -
17
A deep learning approach: The impact of sentiment analysis of Bangladeshi workers over the world
Published 2025“…TF-IDF vectorization was used for feature extraction, followed by basic machine learning algorithms such as Decision Tree, Support Vector Machine, and Naive Bayes. …”
Get full text
Get full text
Get full text
Article -
18
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…Computer networks are becoming increasingly important to the delivery of modern society's basic services. As a result of this growing dependence, traffic and users worldwide have also grown. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A NEW ENERGY EFFICIENT ADAPTIVE HYBRID ERROR CORRECTION TECHNIQUE FOR UNDERWATER WIRELESS SENSORS NETWORKS
Published 2011“…So designing energy efficient communication protocols is an important issue for underwater sensors networks. …”
Get full text
Get full text
Thesis -
20
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…This research aims to increase the accuracy of node trustworthiness evaluation process in order to helps node to make more informed decision prior to establish secure communications. In order to achieve this, different sets of trust information including QoS, OSNs and ant colony system (ACS) algorithm are proposed to improve the selection of trustworthy node. …”
Get full text
Get full text
Get full text
Thesis
