Search Results - (( a constructive sensor algorithm ) OR ( java application model algorithm ))
Search alternatives:
- constructive sensor »
- application model »
- sensor algorithm »
- java application »
- model algorithm »
- a constructive »
-
1
-
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. …”
Get full text
Get full text
Thesis -
4
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
5
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A Distributed Energy Aware Connected Dominating Set Technique for Wireless Sensor Networks
Published 2012“…Our algorithm, a single-phase single initiator (SPSI), only requires a single phase to construct a CDS in a distributed manner using localized information. …”
Get full text
Get full text
Conference or Workshop Item -
7
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…Dynamic-Coalition framework establishes a relevance between sensors and gateways to construct dynamic blocks called dynamic-coalitions. …”
Get full text
Get full text
Get full text
Thesis -
8
Virtual Force Algorithm and Cuckoo Search algorithm for node placement technique in wireless sensor network
Published 2013“…Wireless Sensor Network (WSN) has become one of the current technologies in the world of information technology.Coverage and connectivity are the main requirement that reflects the performance and quality of services in WSN applications.In WSN applications with a large scale area, the sensor nodes are deployed randomly in a noninvasive way.The deployment process will cause some issues such as coverage hole and overlapping that reflect to the performance of coverage area and connectivity.Node placement model is constructed to find the optimal node placement.Virtual Force Algorithm (VFA) and Cuckoo Search (CS) algorithm approach for node placement technique is analyzed to find the optimal node placement in order to improve the network coverage and connectivity with a minimum coverage hole and overlapping area.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
10
-
11
Topology control in heterogeneous wireless sensor networks / Nafiseh Ahadi
Published 2011“…The most challenging issue in a wireless sensor network is energy consumption that affecting to lifetime of the WSN. …”
Get full text
Get full text
Thesis -
12
Clustering Approach In Wireless Sensor Networks Based On K-Means: Limitations And Recommendations
Published 2019“…One of most popular cluster algorithms that utilizing into organize sensor nodes is K-means algorithm. …”
Get full text
Get full text
Get full text
Article -
13
The impact of clustering on the average path length in wireless sensor networks
Published 2015“…Clustering algorithms have been widely used in wireless sensor networks for virtual backbone construction. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
16
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
17
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009“…A series of survey papers provide an excellent comparison of such algorithms and different networking challenges during the current decade, but still a lot left to investigate. …”
Get full text
Get full text
Conference or Workshop Item -
18
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009“…A series of survey papers provide an excellent comparison of such algorithms and different networking challenges during the current decade, but still a lot left to investigate. …”
Get full text
Get full text
Conference or Workshop Item -
19
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
20
