Search Results - (( _ constructive sensor algorithm ) OR ( java application model algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…Dynamic-Coalition framework establishes a relevance between sensors and gateways to construct dynamic blocks called dynamic-coalitions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A Distributed Energy Aware Connected Dominating Set Technique for Wireless Sensor Networks by Abd Aziz, Azrina, Sekercioglu, Ahmet

    Published 2012
    “…This paper presents an energy-efficient algorithm based on the connected dominating set (CDS) for a wireless sensor networks (WSN). …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Virtual Force Algorithm and Cuckoo Search algorithm for node placement technique in wireless sensor network by Ahmad, Puteri Azwa, Mahmuddin, Massudi, Omar, Mohd Hasbullah

    Published 2013
    “…Wireless Sensor Network (WSN) has become one of the current technologies in the world of information technology.Coverage and connectivity are the main requirement that reflects the performance and quality of services in WSN applications.In WSN applications with a large scale area, the sensor nodes are deployed randomly in a noninvasive way.The deployment process will cause some issues such as coverage hole and overlapping that reflect to the performance of coverage area and connectivity.Node placement model is constructed to find the optimal node placement.Virtual Force Algorithm (VFA) and Cuckoo Search (CS) algorithm approach for node placement technique is analyzed to find the optimal node placement in order to improve the network coverage and connectivity with a minimum coverage hole and overlapping area.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Topology control in heterogeneous wireless sensor networks / Nafiseh Ahadi by Ahadi, Nafiseh

    Published 2011
    “…Topology control algorithms are energy efficient mechanisms that extend lifetime of the WSN witch include tow processes, construction and maintenance. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    The impact of clustering on the average path length in wireless sensor networks by Aziz, A.A., Şekercioğlu, Y. A.

    Published 2015
    “…Clustering algorithms have been widely used in wireless sensor networks for virtual backbone construction. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…In addition, at the end we will give some future directions, which can be helpful in order to construct the algorithms for such environments.…”
    Get full text
    Get full text
    Conference or Workshop Item