Search Results - (( using communication from algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…The prototype has been tested on a laboratory scale for its functionality by measuring the electrical parameters using heating elements as the load, and its ability in transferring data through three communications and monitoring as well as communicating with the SEM from DIS. …”
    Get full text
    Get full text
    Thesis
  3. 3

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…Smart grid is an evolution from conventional power grid in which power communication system has migrated from one-way to bi-directional communication network. …”
    text::Thesis
  4. 4
  5. 5

    A new compression algorithm for small data communication in wireless sensor network by Tuama, Ammar Yaseen, Mohamed, Mohamad Afendee, Muhammed, Abdullah, Mohd Hanapi, Zurina

    Published 2017
    “…In this paper, we propose a new lossless compression algorithm that can handle small data communication in WSNs. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots by Ismail, Amelia Ritahani, Tumian, Afidalina

    Published 2019
    “…Therefore this research proposed a novel model for artificial neuro-glial networks and swarm-inspired algorithm for autonomous robots’ communication. Artificial neuro-glial networks is proposed to be combined in the swarm-based communication algorithm to provide a human-like model for the robot's communication and optimization.…”
    Get full text
    Get full text
    Monograph
  7. 7
  8. 8
  9. 9
  10. 10

    Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R.

    Published 2023
    “…The system can cipher the data using PRINCE algorithm on a VIRTEX-403 FPGA evaluation board and using GSM modems to communicate over a cellular network. …”
    Article
  11. 11

    Optimizing the latency of the 4G network by using Routing Algorithm / Rossidah Wan Abdul Aziz ... [et al.] by Wan Abdul Aziz, Rossidah

    Published 2022
    “…The Routing Algorithm hasbeen used todetermine the route or path that data packets will take from source to destination. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Fair and fit resource allocation algorithm for network-controlled device-to-device (D2D) communication / Yusmardiah Yusuf, Darmawaty Mohd. Ali and Roslina Mohamad by Yusuf, Yusmardiah, Mohd. Ali, Darmawaty, Mohamad, Roslina

    Published 2021
    “…Therefore, such issues can be managed if radio resource is assigned intelligently with the coordination from the eNodeB (eNB). In this paper, a Fair and Fit Resource Allocation (FFRA) algorithm is proposed which exploits the path loss experienced by the potential D2D user equipments (UEs) when choosing the communication path. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Bio-inspired fault tolerant network on chip by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…Fault tolerant routing algorithms are used to recover from temporary faults while redundant resources (wires, routers) are required to overcome the permanent faults. …”
    Get full text
    Get full text
    Article
  14. 14

    Variable Global Optimization min-sum (VGOMS) algorithm of decode-and forward-protocol for the relay node in the cooperative channel by Hushairi, Zen, Al-Khalid, Hj Othman, Khairuddin, Abdul Hamid, Jamaah, Suut

    Published 2020
    “…The proposed system model uses the channel combining large-scale and small-scale effects which used extensively in cooperative communications. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Network Security Encryption Techniques for Reliablility Data Transmission on Password System by Norrozila, Sulaiman, Ng, Liang Shen, M. A., Ameedeen

    Published 2013
    “…Encryption and decryption algorithm for secure communication depends on the algorithm while the internal structures of the robustness of the mathematics computation depend on the key it uses. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A Comparative Study on Compression of Different Image File Formats by Ooi, Poh San

    Published 1999
    “…Some of the experiment was done twice with two different types of images to ensure that the results were accurate. The Algorithms used to compress and decompress the image ware Run Length Encoding (RLE) algorithm and Lampel-ziv and Welch (LZW) algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…Wireless Sensor Networks (WSNs) have emerged as one of the most promising so- lutions for wireless communication. They can be used in a wide variety of appli- cations ranging from military tasking, healthcare servicing, disaster prediction and indoor positioning. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Noise Cancellation method in assistive listening system by Noor Aliff, Noor Affande

    Published 2020
    “…The noise cancellation system is categorized as active type of noise cancelling method as it includes adaptive filter and adaptive algorithm. This study also dedicated to use various type of adaptive algorithm to test the performance of each adaptive algorithm in order to identify the most efficient of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad by Saima Gulzar, Ahmad

    Published 2017
    “…The simulation results prove that proposed algorithms outperform from state of the art algorithms for variety of workflows. …”
    Get full text
    Get full text
    Get full text
    Thesis