Search Results - (( based construction protocol algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- construction protocol »
- based construction »
- protocol algorithm »
- java application »
-
1
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
Get full text
Get full text
Thesis -
2
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…CBH shows that by grouping the nodes into clusters and having only one replica in each cluster, has minimized the number of replicas involved in constructing read and write quorums. This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
Get full text
Get full text
Thesis -
3
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…This thesis proposes some techniques to enhance the AMTree protocol. First we propose two algorithms to improve the handoff process in AMTree protocol. …”
Get full text
Get full text
Thesis -
4
-
5
Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology
Published 2022“…Thus, we introduce a new code-based key exchange protocol that is constructed using the Permuted Goppa Syndrome Decoding Problem. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…For EL video packets, an enhanced routing algorithm was proposed to route the Enhance Layer (EL) packets, namely, Energy Sensible and Route Stability Based Routing Protocol (ESRSBRP) which is used over Mobile network. …”
Get full text
Get full text
Get full text
Thesis -
7
A conceptual automated negotiation model for decision making in the construction domain
Published 2023Conference Paper -
8
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
Get full text
Get full text
Thesis -
9
Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links
Published 2014“…An enhanced distributed algorithm is presented that is based on the marking process which is has been introduced in earlier work. …”
Get full text
Get full text
Get full text
Article -
10
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…It provides a general framework for constructing and analyzing authentication protocols in realistic models of communication networks. …”
Get full text
Get full text
Thesis -
11
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
12
Automated multi-agent negotiation framework for the construction domain
Published 2023Conference Paper -
13
Clustering Approach In Wireless Sensor Networks Based On K-Means: Limitations And Recommendations
Published 2019“…Clustering approach in wireless sensor network is very important, the structure of cluster and how to improve it is a first challenge that faced the developers, because of it represent as a base for design the cluster-based routing protocol. …”
Get full text
Get full text
Get full text
Article -
14
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
text::Thesis -
15
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…To show the benefit of the ENP protocol, it has been utilized as the neighbor protocol with the CDS and both are integrated into AODV routing protocol. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Smart site monitoring system / Muhammad Azmi and Muhammad Naim Mahyuddin
Published 2023“…Advanced data analytics and machine learning algorithms process this data, enabling the system to detect potential safety hazards, monitor construction progress, and predict resource requirements. …”
Get full text
Get full text
Conference or Workshop Item -
18
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
Published 2012“…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
Get full text
Get full text
Thesis -
19
A reliable unicast routing protocol for mobile ad hoc network
Published 2013“…Next a reliable position based clustering routing protocol is designed. In this protocol the mobile nodes form disjoint sets of clusters, and for increasing the stability of these clusters, the aforementioned cross layer link reliability metric is used for cluster formation. …”
Get full text
Get full text
Thesis -
20
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis
