Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Noor Alhuda F. Abbas"'
Publikováno v:
International Journal of Robotics and Control Systems. 2:628-637
The purpose of this paper was to take a preventative approach to predict the transmission status of the primary user (PU) on the white spectrum throughout the duration of the simulation. We intend to reduce the computational simulation budget to elim
Autor:
Noor Alhuda F. Abbas
Publikováno v:
THE SECOND INTERNATIONAL SCIENTIFIC CONFERENCE (SISC2021): College of Science, Al-Nahrain University.
Publikováno v:
Bulletin of Electrical Engineering and Informatics. 10:2643-2651
There are certain challenges faced with wireless sensor networks (WSNs) performances, consumption can be seen amongst all these challenges as a serious area of research. Data from sensor nodes are transmitted by most WSN energy either among many node
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811694875
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::516c3835fbb63874d42e26788c937f55
https://doi.org/10.1007/978-981-16-9488-2_72
https://doi.org/10.1007/978-981-16-9488-2_72
Publikováno v:
International Journal on Advanced Science, Engineering and Information Technology. 12:2274
Publikováno v:
Journal of Computational and Theoretical Nanoscience. 16:1046-1055
Autor:
Noor Alhuda F. Abbas
Publikováno v:
Intelligent Systems and Networks ISBN: 9789811620935
The rapid expansion in the industrial revolution has been aroused to utilize of the robot in various high accuracy and productivity applications. Optimal path planning is an important concern in navigation of mobile robot interesting with finding an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::105ce4eaadcdc12bd33bb8ba34d2da5e
https://doi.org/10.1007/978-981-16-2094-2_64
https://doi.org/10.1007/978-981-16-2094-2_64
Publikováno v:
International Journal of Electrical and Computer Engineering (IJECE). 12:694
Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In o