Search Results - (( using function methods algorithm ) OR ( using communication devices algorithm ))
Search alternatives:
- communication devices »
- using communication »
- methods algorithm »
- devices algorithm »
- function methods »
- using function »
-
1
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
Get full text
Get full text
Thesis -
2
Development of low power viterbi decoder on complex programmable logic device platform
Published 2018“…This especially has been used in a noisy digital communication system such as wireless communication. …”
Get full text
Get full text
Get full text
Thesis -
3
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…Next, the Dynamic Demand Replacement Algorithm (DDRA) algorithm is used to place in-demand functions near the edge nodes periodically, while the proposed task scheduling algorithm - Maximum Revenue Bid (MRB) is used to give priority to tasks to maximise revenue near the edge. …”
Get full text
Get full text
Get full text
Article -
4
Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems
Published 2016“…Adaptive algorithms used to estimate the QM’s imperfections, operate either in online or offline mode. …”
Get full text
Get full text
Thesis -
5
-
6
EEG EYE STATE IDENTIFICATION BASED ON STATISTICAL FEATURES AND COMMON SPATIAL PATTERN
Published 2019“…Hence, the proposed work aimed to analyse the EEG eye state signal as well as develop an algorithm using statistical-CSP features on the eye state identification.…”
Get full text
Get full text
Final Year Project -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
8
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…A two layer encryption functions in PHP was designed for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…Extensive computations utilizing MATLAB 2018a on the Intel Core i7/Gen 10 processor and 16 GB of RAM are used to evaluate the algorithm efficacy. According to the blueprint of our heuristic method, the allocation and the optimum number of controllers under an effective decentralized policy could achieve higher efficiency. …”
Get full text
Get full text
Thesis -
10
Particle swarm optimization with partial search to solve traveling salesman problem
Published 2012“…PSO has found as an efficient method for solving function optimization problems, and recently it also studied to solve combinatorial problems such as Traveling Salesman Problem (TSP). …”
Get full text
Get full text
Proceeding Paper -
11
-
12
Brain machine interface: classification of mental tasks using short-time PCA and recurrent neural networks
Published 2009Get full text
Working Paper -
13
Integration Of Machine Vision In Industrial Robot For Automated Composite Panel Punching
Published 2018“…By using socket module for Python programming language, the feedback control system is built by communicating RPi with KRC4 through Ethernet using KUKA Robot Language (KRL) to enable the robot to execute the whole process. …”
Get full text
Get full text
Thesis -
14
BMI using spectral energy entropy for colour visual tasks
Published 2012Get full text
Working Paper -
15
Adaptive array antenna design for wireless communication systems
Published 2013“…In previous single-port beamforming methods, the spatial information of the signals is not fully recovered and this limits the use of conventional adaptive beamforming algorithms. …”
Get full text
Get full text
Thesis -
16
Discovering optimal features using static analysis and a genetic search based method for Android malware detection
Published 2018“…These criminals gain numerous benefits as many people use android for their daily routines, including important communications. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Green anaconda optimization based energy aware clustering protocol for 6G wireless communication systems
Published 2023“…The selection of proper CHs using metaheuristic algorithms fnds useful in design of energy-efcient WSNs. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
Development of fish cupula inspired multi-fluidic sensor for liquid slosh detection
“…Here, the identification of liquid slosh using the Hammerstein model based on Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Research Report -
19
Efficient radio resource allocation scheme for 5G networks with device-to-device communication
Published 2024journal::journal article -
20
Fair and fit resource allocation algorithm for network-controlled device-to-device (D2D) communication / Yusmardiah Yusuf, Darmawaty Mohd. Ali and Roslina Mohamad
Published 2021“…Device-to-device (D2D) communication is a promising new feature for next generation cellular networks. …”
Get full text
Get full text
Get full text
Article
