Search Results - (( basic computer ((max algorithm) OR (drops algorithm)) ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- basic computer »
- max algorithm »
-
1
Fractal coding of bio-metric image for face authentication
Published 2021Get full text
Get full text
Thesis -
2
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis -
3
-
4
-
5
-
6
-
7
Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks
Published 2022“…Besides, the weighted coefficient and centroid algorithm is employed to reduce cumulative error by hop count and cut down computational complexity. …”
Get full text
Get full text
Thesis -
8
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
9
-
10
The enhanced fault-tolerant AODV routing protocol for Wireless Sensor Network
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
11
INVESTIGATION ON THE CUTTING PARTICLES TRANSPORT IN HORIZONTAL WELL DRILLING
Published 2010“…Due to high non- linearity, both were solved numerically after conversion to computer algorithms using MATLAB. The master model examined the performance of irregular shaped cuttings transported in concentric annulus by non-Newtonian fluids. …”
Get full text
Get full text
Thesis -
12
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…Computer networks are becoming increasingly important to the delivery of modern society's basic services. …”
Get full text
Get full text
Get full text
Get full text
Thesis
