Search Results - (( based testing protocol algorithm ) OR ( java location based algorithm ))
Search alternatives:
- protocol algorithm »
- testing protocol »
- based testing »
- java »
-
1
Encryption selection for WLAN IEEE802.11G
Published 2013“…There were two scenarios that have been tested in the simulation. In the first scenario, the data was tested with encryption protocols and for the second scenario, the data was tested with encryption algorithms and also encryption protocols. …”
Get full text
Get full text
Thesis -
2
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017“…Thus, smart protocol algorithm is developed to replace the previous system. …”
Get full text
Get full text
Monograph -
3
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization
Published 2022“…Based on the testing result, the FSM-GEAR protocol minimized the energy consumption by about 12.5% than the M-GEAR protocol. …”
Get full text
Get full text
Get full text
Thesis -
6
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
7
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
8
-
9
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
10
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
11
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…The proposed protocol security performance is analyzed using cryptographic protocols verifier software and tested. …”
Get full text
Get full text
Article -
12
Optimal forwarding routing protocol in ipv6-based wireless sensor network
Published 2009“…Here, actual performance of OF routing protocol is evaluated and compared with Greedy Forwarding and RIP routing protocol in WSN test bed. …”
Get full text
Get full text
Thesis -
13
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
14
A new particle swarm optimization for wireless mesh routing protocol
Published 2008“…Based on the results, we proven that PSO-SIIW algorithm can be applied to MPR calculation in OLSR.…”
Get full text
Monograph -
15
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…To validate the proposed ECG-based authentication protocol model, the FAR and FRR analysis is done and then followed by the complexity analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
-
17
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
18
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
19
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
20
Personalized administration of contrast medium with high delivery rate in low tube voltage coronary computed tomography angiography
Published 2019“…The algorithm was retrospectively tested in 45 patients who underwent retrospectively ECG-gated CCTA with a 100 kVp protocol. …”
Get full text
Get full text
Article
