Search Results - (( variable internet application algorithm ) OR ( java adaptation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique for Video Transmission by Ahmad Suki, Che Mohamed Arif

    Published 2011
    “…This new shaped algorithm, referred to as Slight Delay - Shaped Variable Bit Rate (SD-SVBR), is aimed at controlling the video rate for video application transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Simulation Of Token Bucket Algorithm For Network Traffic Performance by Yusof, Robiah, Mat Nawi, Nor Afifah

    Published 2020
    “…This algorithm has successfully reduced the delay in the network traffic and improve the response time when users request several applications concurrently.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    DESIGN OF SMART TRAFFIC LIGHT SYSTEM BASED ON INTERNET OF THINGS by MUHAMMAD AMIR AFIQ, MOHAMED

    Published 2018
    “…Density of the traffic is calculated by the algorithm that have various variables. The system will synchronize with Android Application, which can show the notification of alert system, level of traffic congestion and real-time sensors data for each junction. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5
  6. 6

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Performance evaluation of lightweight Crypto functions for Internet of things applications by Jaleel, Nubila, Habaebi, Mohamed Hadi, Islam, Md Rafiqul

    Published 2020
    “…In addition, the paper highlights the need for a new one-way hash function which supports variable transformation and variable block length size to suit several applications.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…In this thesis, the human handwritten signature is introduced as a novel cover media (c) in conjunction with a steganography algorithm since there is a level of variability (i.e intra-user variability) within handwritten signature samples of an individual. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Interference avoidance routing and scheduling using multiple transceivers for IEEE 802.16 mesh network by Qasem, Yaaqob Ali Ahmed

    Published 2010
    “…Demand for broadband access networks has grown rapidly with the increased demand for Internet connectivity and multimedia services. Fixed broadband wireless access systems based on the IEEE 802.16 standard defines the wireless broadband access technology called WiMAX (Worldwide Interoperability Microwave Access), which introduces several interesting advantages including variable and high data rate, last mile wireless access, mesh and point to multipoint communication, large frequency range and QoS (Quality of Service) for various types of applications. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The concern with security problems has been rapidly increasing as computers and Internet services become a more pervasive part of our daily life. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network by Ng, Roger Cheng Yong

    Published 2006
    “…QoS delivers predictability and consistency into existing variability of best-effort delivery system offered in internet protocol (IP) and IEEE 802.11 wireless networks. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications by IZZAH NILAMSYUKRIYAH, BUANG, Kartinah, Zen, Syahrul Nizam, Junaini

    Published 2025
    “…Abstract: The proliferation of Internet of Things (IoT) applications has significantly increased the demand for communication protocols that are both resilient and energy-efficient. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Steganography For Embedding Data In Digital Image by Sowan, Salah Ibrahem

    Published 2003
    “…In the design part, we present new data hiding algorithms for binary images, grayscale and color images, covering such applications as annotation, fingerprinting, and ownership protection.…”
    Get full text
    Get full text
    Thesis