Search Results - (( based classification protocol algorithm ) OR ( program visualization using algorithm ))
Search alternatives:
- classification protocol »
- based classification »
- protocol algorithm »
- using algorithm »
-
1
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
2
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
3
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. This algorithm depends on the adaptability of the concept in the ITSWTCM, I2TSWTCM and M2I2TSWTCM algorithms for affecting the fairness and multiple protocols. …”
Get full text
Get full text
Thesis -
5
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
6
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…This thesis proposes a TLS-based malware detection (TLSMalDetect) approach based on ML classification to address flow feature utilization limitations in related work. …”
Get full text
Get full text
Thesis -
7
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
Published 2018“…In order to address the issue in this research presents a novel protocol based on equal power consumption at all network nodes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Fuzzy logic based link status classification for efficient multipath routing in multi-hop wireless mesh networks
Published 2014“…This paper presents a new fuzzy logic based link status classification mechanism for use with multipath routing protocols in multi-hop wireless networks like WMNs. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Optimizing Visual Surveillance Sensor Coverage Using Dynamic Programming
Published 2017“…The main contribution of the paper is to introduce a dynamic programming algorithm, which defines an optimal policy for solving the visual sensor coverage problem. …”
Get full text
Get full text
Article -
11
A Patent Technique of Jaccard Discrete (J-DIS) Similarity Clustering Algorithm
Published 2014“…Mostly, k-Means algorithm finds out similarity between the object based on distance vector for smallest dataset. …”
Get full text
Get full text
Journal -
12
Simulation and Visualization of TSP Using Ant Colony Optimization
Published 2023“…The study concludes that optimization can be applied using programming language to provide users with comfortable and intelligible simulations and visualizations.…”
Get full text
Get full text
Get full text
Article -
13
Energy-efficient intrusion detection in wireless sensor network
Published 2012“…Attacks can occur from any direction and any node in WSNs, so one crucial security challenge is to detect networks' intrusion. There are several algorithms for building Intrusion Detection Systems (IDS) based on different WSN routing protocol classifications with respect to energy-efficient manner. …”
Get full text
Get full text
Conference or Workshop Item -
14
Ultrasonic Tomography System For Liquid/Gas Flow: Frame Rate Comparison Between Visual Basic And Visual C++ Programming
Published 2006“…In order to process and simulate a tomography system, it has been found that Visual C++ programming has an advantage one step ahead compared to Visual Basic programming. …”
Get full text
Get full text
Get full text
Article -
15
Budget visualizer using circle packing technique / Nursyahira Zulkeply
Published 2019“…In order to construct this data visualization, the circle packing algorithm is used to visualize these budgets. …”
Get full text
Get full text
Thesis -
16
Ray Casting for Iso-surface in Volumetric Data
Published 2005“…The program will be able to render specific volume data using a single processor in a reasonable amount of time. …”
Get full text
Get full text
Final Year Project -
17
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…By using Red Partitioning of high order elements, the implemented algorithm successfully enables visualization of up to fourth order tetrahedra while using the same data structure for second order tetrahedra as available in ParaView. …”
Get full text
Get full text
Thesis -
18
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The reliability of VR supports various variations in learning, including learning programming algorithms. This research aims to design and develop VR in learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
20
Computer algorithm for playing checkers
Published 2023“…The Checkers game is programmed using Visual C++. Two players can play the game or against the computer The Al algorithm will select the best path to win when playing against the human. …”
text::Thesis
