Search Results - (( using communication technique algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- communication technique »
- optimisation algorithm »
- using communication »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
3
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. …”
Get full text
Get full text
Thesis -
4
Bio-inspired fault tolerant network on chip
Published 2017“…The bio-inspired mechanisms of “synaptogenesis” and “sprouting” have been adopted in the proposed NoC algorithms and architecture. These techniques were implemented using the BE and GT services. …”
Get full text
Get full text
Article -
5
FPGA implementation of CPFSK modulation techniques for HF data communication
Published 2003Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…However, the need to use less complex and low-cost sensor de- vice results in constraints in computational power, communication bandwidth, and operational energy. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Embedded parallel distributed artificial intelligent processors for adaptive beam forming in WCDMA system
Published 2023“…Genetic algorithms (GAs) are powerful search techniques that are used successfully to solve problems in many different disciplines. …”
Conference paper -
9
-
10
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item -
11
Comparative study of some symmetric ciphers in mobile systems
Published 2014“…Some cryptanalysis techniques (e.g. Sandwich Cryptanalysis Technique, Sliding Property Technique, Differential Cryptanalysis Technique, and Biclique Cryptanalysis Technique) can be used to attack these symmetric ciphers, therefore there is a need for more analysis studies to address the security problems of these ciphers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Fuzzy based technique for microchip lead inspection using machine vision
Published 2008Get full text
Get full text
Proceeding Paper -
13
Performance evaluation of compression techniques on scientific dataset / Lam Wai Leong
Published 2006“…This template shall minimise any doubt and confusion of choosing and using a compression techniques. …”
Get full text
Get full text
Thesis -
14
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…Performance of the QPSO technique based on many heuristic algorithms it is comprised the following steps. …”
Get full text
Thesis -
15
-
16
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…Students are also excited about the algorithmic techniques and the scratch program generated. …”
Get full text
Get full text
Get full text
Article -
17
Lightweight authentication technique for secure communication of edge/fog data-centers
Published 2020“…It is also vulnerable to key escrow attack because the secret key used for encrypting and decrypting of the communicated messages is been created by the trusted cloud datacenter. …”
Get full text
Get full text
Article -
18
-
19
-
20
Non pilot and pilot aided least square channel estimation algorithm in MIMO-OFDM system / Nursarah Ainaa Abdul Halim
Published 2013“…Wireless communication is a developed technology and had been widely used nowadays, so the developments in digital communication are rapidly increasing to meet the ever increasing demand of higher data rates. …”
Get full text
Get full text
Thesis
