Search Results - (( variable internet application algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- application algorithm »
- internet application »
- java adaptation »
- variable »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique for Video Transmission
Published 2011“…This new shaped algorithm, referred to as Slight Delay - Shaped Variable Bit Rate (SD-SVBR), is aimed at controlling the video rate for video application transmission. …”
Get full text
Get full text
Get full text
Thesis -
3
Simulation Of Token Bucket Algorithm For Network Traffic Performance
Published 2020“…This algorithm has successfully reduced the delay in the network traffic and improve the response time when users request several applications concurrently.…”
Get full text
Get full text
Get full text
Article -
4
DESIGN OF SMART TRAFFIC LIGHT SYSTEM BASED ON INTERNET OF THINGS
Published 2018“…Density of the traffic is calculated by the algorithm that have various variables. The system will synchronize with Android Application, which can show the notification of alert system, level of traffic congestion and real-time sensors data for each junction. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
5
The relationship of TFRC congestion control to video rate control optimization
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…In addition, the paper highlights the need for a new one-way hash function which supports variable transformation and variable block length size to suit several applications.…”
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
Zero distortion-based steganography for handwritten signature
Published 2018“…In this thesis, the human handwritten signature is introduced as a novel cover media (c) in conjunction with a steganography algorithm since there is a level of variability (i.e intra-user variability) within handwritten signature samples of an individual. …”
Get full text
Get full text
Get full text
Thesis -
10
Interference avoidance routing and scheduling using multiple transceivers for IEEE 802.16 mesh network
Published 2010“…Demand for broadband access networks has grown rapidly with the increased demand for Internet connectivity and multimedia services. Fixed broadband wireless access systems based on the IEEE 802.16 standard defines the wireless broadband access technology called WiMAX (Worldwide Interoperability Microwave Access), which introduces several interesting advantages including variable and high data rate, last mile wireless access, mesh and point to multipoint communication, large frequency range and QoS (Quality of Service) for various types of applications. …”
Get full text
Get full text
Thesis -
11
-
12
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The concern with security problems has been rapidly increasing as computers and Internet services become a more pervasive part of our daily life. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
-
16
-
17
-
18
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
Published 2006“…QoS delivers predictability and consistency into existing variability of best-effort delivery system offered in internet protocol (IP) and IEEE 802.11 wireless networks. …”
Get full text
Get full text
Thesis -
19
Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications
Published 2025“…Abstract: The proliferation of Internet of Things (IoT) applications has significantly increased the demand for communication protocols that are both resilient and energy-efficient. …”
Get full text
Get full text
Get full text
Article -
20
Steganography For Embedding Data In Digital Image
Published 2003“…In the design part, we present new data hiding algorithms for binary images, grayscale and color images, covering such applications as annotation, fingerprinting, and ownership protection.…”
Get full text
Get full text
Thesis
