Search Results - (( based constructive method algorithm ) OR ( using communication using algorithm ))
Search alternatives:
- using communication »
- communication using »
- based constructive »
- method algorithm »
- using algorithm »
-
1
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
Get full text
Get full text
Thesis -
2
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
Article -
3
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. …”
Get full text
Get full text
Thesis -
4
Genetic algorithm techniques for the design of nonlinear microwave circuits
Published 2004“…By using Sample Balance's differential of current linear and nonlinear equation as an objective function, a Genetic Algorithm routine then been constructed. Genetic Algorithm will then recombine, mutate and evaluate the population of solution to find the best solution based on Sample balance equation. …”
Get full text
Get full text
Get full text
Thesis -
5
Solving Examination Timetabling Problem using Partial Exam Assignment with Great Deluge Algorithm
Published 2015“…In this approach, exams are ordered based on graph heuristics and only selected exams (partial exams) are scheduled first and then improved using great deluge algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
6
A Distributed Topology Control Method for Improving Energy Efficiency of Wireless Sensor Networks
Published 2012“…By using the TPSI algorithm, our method can build the virtual backbone in a fully distributed manner using localized information. …”
Get full text
Get full text
Conference or Workshop Item -
7
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
Underwater Acoustic Communication (UWA) Data Packet Size Optimization based on Throughput
Published 2010“…The main contribution of this project is the algorithm and the lookup table construction developed for selecting optimal packet size in underwater communication efficiency.…”
Get full text
Get full text
Final Year Project -
9
Modeling and analysis of the impact of information and communication technology on household consumption expenditure in different regions
Published 2022“…Based on the panel data of cities and towns in China, by using the generalized estimation method of a dynamic panel, through the construction of regional household consumption expenditure evaluation models, optimize the impact evaluation algorithm of household consumption expenditure in different regions, standardize critic indicators, and build the impact modeling of household consumption expenditure in combination with relevant algorithms such as the Engel coefficient. …”
Get full text
Get full text
Article -
10
Feature clustering for pso-based feature construction on high-dimensional data
Published 2019“…Experimental results were obtained by using six UCI data sets and six high-dimensional data to demonstrate the efficiency of the proposed method when compared to the original full features, other PSO based FC methods, and standard genetic programming based feature construction (GPFC). …”
Get full text
Get full text
Get full text
Article -
11
Survey on language processing algorithm for sign language synthesizer
Published 2017“…SL synthesizer is a tool that synthesizes or constructs series of signs of a particular SL based on the speech input given to the system. …”
Get full text
Get full text
Get full text
Article -
12
Applying empirical thresholding algorithm for a keystroke dynamics based authentication system
Published 2019“…In this paper, a novel algorithm is proposed to authenticate the legal users based on the empirical threshold values. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…These steps have conducted using the MEMPHA model and ROA algorithm to optimize three metrics: execution time, total communication volume, and imbalance ratio (load balancing). …”
Get full text
Get full text
Thesis -
15
-
16
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…The signal from the sensor is then applied for power switching devices of the PO buck-boost converter by the attained maximum power point current from CoDID MPPT method. The system is constructed from model-based design (MBD) of the PV system. …”
Get full text
Get full text
Thesis -
17
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
18
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…It provides a general framework for constructing and analyzing authentication protocols in realistic models of communication networks. …”
Get full text
Get full text
Thesis -
19
A proactive energy awareness traffic routing for wireless sensor networks against energy sink-holes
Published 2019“…In this thesis, cooperative communication based on tree topology construction is proposed to address energy and routing decision challenges in WSNs with single and multiple sinks. …”
Get full text
Get full text
Thesis -
20
Web service applications and consumer environments based on ICT-driven optimization
Published 2022“…Therefore, this paper proposes a service recommendation model based on the hybrid embedding of multiple networks and designs a multinetwork hybrid embedding recommendation algorithm. …”
Get full text
Get full text
Article
