Search Results - (( using communication practices algorithm ) OR ( java application reoptimize algorithm ))
Search alternatives:
- communication practices »
- application reoptimize »
- using communication »
- java application »
-
1
Disparity between theory & practice beyond the worst-case competitive analysis
Published 2019Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Securing IEC60870-5-101 Communication Protocol using SCADA Cryptographic and Device Authentication Gateway
Published 2023Conference Paper -
3
Reliability performance evaluation and integration of routing algorithm in shuffle exchange with minus one stage
Published 2012“…These routing algorithms are Zero X, Zero Y, ZeroYbit, ZeroXbit, Sequential Increasing and Sequential Decreasing Algorithm. …”
Get full text
Get full text
Thesis -
4
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
5
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…Programming software is required in order to execute the image acquisition and image analysis algorithm. In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
Get full text
Get full text
Monograph -
6
-
7
-
8
-
9
A Distributed Energy Aware Connected Dominating Set Technique for Wireless Sensor Networks
Published 2012“…Therefore, it is simple and practical to implement. The performance of our algorithm is confirmed through simulations and validated against two leading CDS algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
10
Cryptographic Algorithm Using Matrix Inversion as Data Protection
Published 2011Get full text
Get full text
Get full text
Article -
11
Real time electrocardiogram identification with multi-modal machine learning algorithms
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim
Published 2007“…It makes use of three basic operations in order to optimize this problem. …”
Get full text
Get full text
Thesis -
13
A New Technique To Design Coating Structure For Energy Saving Glass Using The Genetic Algorithm
Published 2017“…After modifying these shapes using the Genetic algorithm and Parallel Genetic algorithm, the outputs are simulated in the Computer Simulation Technology (CST) simulation software. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
On-chip communication system modeling approach for reability analysis focusing on functional failures
Published 2012“…Finally, the significance of using a practical on-chip communication system model is demonstrated through applying the proposed modelling approach to study the impacts of different communication approaches and circuit-level modifications on the reliability performance focussing on functional failures. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…Programming software is required in order to execute the image acquisition and image analysis algorithm. In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
Get full text
Get full text
Thesis -
18
An Effective Power Dispatch Strategy for Clustered Micro-grids while Implementing Optimal Energy Management and Power Sharing Control using Power Line Communication
Published 2019“…The developed hybrid algorithm implements optimal energy management and power sharing control using binary data. …”
Get full text
Get full text
Get full text
Proceeding -
19
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…They often communicate using appropriate protocols such as MQTT, CoAP, or HTTP to ensure the smooth transmission of data used by a variety of smart home services. …”
Get full text
Get full text
Article -
20
Digital Framing and Reputation Crisis: A TikTok Framing Analysis of the Yai Mim–Sahara Case in the Context of Communication
Published 2026journal-article
