Search Results - (( using communication technique algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  3. 3

    A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata by Mohamad Hata, Mohsen

    Published 2019
    “…Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Bio-inspired fault tolerant network on chip by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…The bio-inspired mechanisms of “synaptogenesis” and “sprouting” have been adopted in the proposed NoC algorithms and architecture. These techniques were implemented using the BE and GT services. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…However, the need to use less complex and low-cost sensor de- vice results in constraints in computational power, communication bandwidth, and operational energy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Embedded parallel distributed artificial intelligent processors for adaptive beam forming in WCDMA system by Krishnan P.S., Kiong T.S., Koh J., Yap D.

    Published 2023
    “…Genetic algorithms (GAs) are powerful search techniques that are used successfully to solve problems in many different disciplines. …”
    Conference paper
  9. 9
  10. 10
  11. 11

    Comparative study of some symmetric ciphers in mobile systems by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2014
    “…Some cryptanalysis techniques (e.g. Sandwich Cryptanalysis Technique, Sliding Property Technique, Differential Cryptanalysis Technique, and Biclique Cryptanalysis Technique) can be used to attack these symmetric ciphers, therefore there is a need for more analysis studies to address the security problems of these ciphers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13

    Performance evaluation of compression techniques on scientific dataset / Lam Wai Leong by Lam , Wai Leong

    Published 2006
    “…This template shall minimise any doubt and confusion of choosing and using a compression techniques. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing by Elrasheed Ismail, Sultan

    Published 2013
    “…Performance of the QPSO technique based on many heuristic algorithms it is comprised the following steps. …”
    Get full text
    Thesis
  15. 15
  16. 16

    Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language by Jano, Zanariah, Omar, Norliza, Nazir, Faridah

    Published 2019
    “…Students are also excited about the algorithmic techniques and the scratch program generated. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Lightweight authentication technique for secure communication of edge/fog data-centers by Yahuza, Muktar, Idris, Mohd Yamani Idna, Wahab, Ainuddin Wahid Abdul, Garba, Adamu Abdullahi, Musa, Mahadi A.

    Published 2020
    “…It is also vulnerable to key escrow attack because the secret key used for encrypting and decrypting of the communicated messages is been created by the trusted cloud datacenter. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Non pilot and pilot aided least square channel estimation algorithm in MIMO-OFDM system / Nursarah Ainaa Abdul Halim by Abdul Halim, Nursarah Ainaa

    Published 2013
    “…Wireless communication is a developed technology and had been widely used nowadays, so the developments in digital communication are rapidly increasing to meet the ever increasing demand of higher data rates. …”
    Get full text
    Get full text
    Thesis