Search Results - (( basic network selection algorithm ) OR ( java implementation _ algorithm ))
Search alternatives:
- selection algorithm »
- java implementation »
- basic network »
-
1
Routing performance enhancement in hierarchical torus network by link-selection algorithm
Published 2005“…A hierarchical torus network (HTN) is a 2D-torus network of multiple basic modules, in which the basic modules are 3D-torus networks that are hierarchically interconnected for higher-level networks. …”
Get full text
Get full text
Get full text
Article -
2
Dynamic communication performance enhancement in hierarchical torus network by selection algorithm
Published 2012“…A Hierarchical Torus Network (HTN) is a 2D-torus network of multiple basic modules, in which the basic modules are 3D-torus networks that are hierarchically interconnected for higher-level networks. …”
Get full text
Get full text
Get full text
Article -
3
Butterfly traffic pattern in selection algorithm on hierarchical torus network
Published 2015“…A Hierarchical Torus Network (HTN) is a 2D- torus network of multiple basic modules, in which the basic modules are 3D-torus networks that are hierarchically inter- connected for higher-level networks. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Adaptive routing algorithms and implementation for TESH network
Published 2013“…Thus, those algorithms can also be applied to TESH network. We have proposed three adaptive routing algorithms—channel-selection, link-selection, and dynamic dimension reversal—for the efficient use of network resources of a TESH network to improve dynamic communication performance. …”
Get full text
Get full text
Get full text
Article -
5
A cost and delay estimation of a suite of low-cost adaptive routers for hierarchical torus network
Published 2012“…A Hierarchical Torus Network (HTN) is a 2D-torus network of multiple basic modules, in which the basic modules are 3D-torus networks that are hierarchically interconnected for higher-level networks. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
The non-uniform communication performance of adaptive routing for hierarchical interconnection network for 3D VLSI
Published 2015“…Thus, those algorithms can also be applied to TESH network. We have proposed three adaptive routing algorithms - channel-selection, link-selection, and dynamic dimension reversal - for the efficient use of network resources of a TESH network to improve dynamic communication performance. …”
Get full text
Get full text
Get full text
Article -
8
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
9
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
10
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
11
-
12
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
13
Network analysis for GPS UTMnav system: preliminary stage
Published 2008“…Each algorithm was reviewed and a simulation test was conducted to evaluate the selected algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
15
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
16
Static image of hand gesture for numerical sign language recognition system using backfrofagation neural network / Erman Ibrahim
Published 2007“…This project is about recognizing hand gesture for sign language using backpropagation (BP) algorithm that is one of the training algorithms used in the Artificial Neural Network (ANN). …”
Get full text
Thesis -
17
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
18
The advantages of genetic algorithm and neural networks to forecast air pollution trend in Malaysia: an overview / Mohamad Idham Md Razak … [et al.]
Published 2012“…Genetic Algorithms (GAs) are adaptive heuristic search algorithm premised on the evolutionary ideas of natural selection and genetic. …”
Get full text
Get full text
Book Section -
19
-
20
