Search Results - (( data distribution issues algorithm ) OR ( data distribution connection algorithm ))
Search alternatives:
- connection algorithm »
- distribution issues »
- data distribution »
- issues algorithm »
-
1
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…Connectivity is a critical issue in WSNs, as the data collected needs to be sent to the base station or the processing centers. …”
Get full text
Get full text
Thesis -
2
-
3
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…One of the challenging issues for a grid-connected distributed generation is to find a suitable technique to detect an islanding problem. …”
Get full text
Get full text
Thesis -
4
Towards enhancing power system protection in distribution systems with distributed generation: a graph theory-based systematic relay placement approach
Published 2024“…Results show consistent and reliable relay placement locations, considering DG locations and load priorities. The algorithm's speed, effectiveness, and adaptability to different network topologies make it a promising approach for power system protection planning in distribution systems with distributed generation.…”
Get full text
Get full text
Get full text
Get full text
Article -
5
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…Similarly, in terms of flat priority based scheduling issues, the proposed algorithm also is found to be of higher performance up to 42 users for video applications and 60 users for the metering data applications. …”
Get full text
Get full text
Thesis -
6
OFF-GRID SOLAR PHOTOVOLTAIC (PV) DESIGN BASED ON FUZZY TECHNIQUE FOR ORDER PERFORMANCE BY SIMILARITY TO IDEAL SOLUTION (TOPSIS) APPROACH
Published 2022“…PV technology comprises the grid-connected PV systems and off-grid PV systems. Off-grid PV systems generate and distribute electrical energy independently, unlike the grid-connected PV systems. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
Characterization of Internet Traffic in UUM Wireless Networks
Published 2012“…The trace composes of two parts: firstly, one that connects to the core switch in computer center which is connected with the distribution switches that link the Access Point (APs) with the wireless network at campus, and secondly, another one for the measurement of bulk data transfers and interactive data exchange between two nodes in UUM library, which had been initiated at that time. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN
Published 2022“…Due to finite resource, multiple issues need to be considered in designing such system, including AG flight time, coverage radius and the achievable data rate of the ground-to-air system, thus an Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…AI algorithms rely on data or information to learn, analyze, and reach conclusions. …”
Get full text
Get full text
Get full text
Article -
10
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…AI algorithms rely on data or information to learn, analyze, and reach conclusions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
Published 2018“…The consume power fairly (CPF) protocol achieves a high power efficiency by distributing power consumption equal on all the network nodes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
Published 2018“…The main attraction is to provide a secure channel between a cloud client to establish a connection among them by applying the theories from Von Neumann and Shannon entropies and also Shor's algorithm. …”
Get full text
Get full text
Thesis -
13
Exploring employee working productivity: initial insights from machine learning predictive analytics and visualization
Published 2023“…Future research can explore more advanced machine learning algorithms, incorporate time-series analysis for temporal dependencies, and expand data collection from diverse organizational settings to improve the generalizability of predictive models.…”
Get full text
Get full text
Get full text
Article -
14
Multicast-unicast key management and data delivery method in wireless IPv6 networks
Published 2012“…Whenever a new node is granted to join or leave a multicast group, a new key should be generated and distributed to every node in the network. Considering a highly dense environment where connection of users to the network is frequently changing due to join or leave operations, such approach may burden a network device with a huge amount of complex encryption and decryption process.While a number of algorithms has been proposed to address this issue, most of the existing approaches have to increase their encryption and decryption cycles in order to maintain the security level of the key management, thereby again suffering from high computation cost. …”
Get full text
Get full text
Thesis -
15
Single fitness function analysis of energy-consumption and radio bandwidth management in coverage area problems
Published 2024thesis::master thesis -
16
Binary Vote Assignment on Cloud Quorum Algorithm for Fragmented MyGRANTS Database Replication
Published 2015“…Therefore, the storage, availability, and consistency are important issues to be addressed in order to allow distributed users efficiently and safely access data from many different sites. …”
Get full text
Get full text
Get full text
Article -
17
Density based subspace clustering: a case study on perception of the required skill
Published 2014“…This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
Get full text
Get full text
Thesis -
18
Density subspace clustering: a case study on perception of the required skill
Published 2014“…This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
Get full text
Get full text
Thesis -
19
A novel binary vote assignment grid quorum algorithm for distributed database fragmentation
Published 2011“…Therefore, the storage, availability, and consistency are important issues to be addressed in order to allow distributed users efficiently and safely access data from many different sites. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
