Search Results - (( developing connection between algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- developing connection »
- connection between »
- between algorithm »
- java implication »
- implication tree »
- tree algorithm »
-
1
Performance enhancement of AIMD algorithm for congestion avoidance and control
Published 2011“…National Chiao Tung University’s network simulation (NCTUns) has been used in this development to compare the new algorithm with the older versions and determine its advantages over the older versions. …”
Get full text
Get full text
Thesis -
2
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
Get full text
Get full text
Thesis -
3
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
4
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…A noise model has been developed to test the reliability of the proposed algorithm. …”
Get full text
Get full text
Thesis -
5
-
6
UiTM Malaysia route planner / Mohamad Yunus Mohamed Nasir
Published 2008“…Route planner is a connecting route between a starting point and a point of destination, wherein the starting point, point of destination and connecting route. …”
Get full text
Get full text
Thesis -
7
A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus
Published 2023“…This thesis presents a new algorithm for output prediction and online monitoring in a Grid-Connected Photovoltaic (GCPV) system based on an artificial neural network. …”
Get full text
Get full text
Thesis -
8
The use of people rank technique for data dissemination in opportunistic network
Published 2015“…In this paper, we are going to develop on one of the forwarding algorithm, People Rank algorithm, which is a social-based forwarding algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…Lastly, a comparison is made through simulation between all algorithms developed in this research with previous Zero-based algorithms as well as traditional Heuristic algorithms since equal routing results can be obtained between all algorithms. …”
Get full text
Get full text
Thesis -
10
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…Thus, there is a room for further enhancement to develop a routing algorithm as to mitigate the drawbacks with the NCPR. …”
Get full text
Get full text
Get full text
Thesis -
11
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. …”
Get full text
Get full text
Thesis -
12
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…Next, the framework of QAPU was designed and developed. For this purpose, some gates and connections were projected in the framework which could be applied for future quantum algorithms. …”
Get full text
Get full text
Thesis -
13
Structural assessment of a proposed precast wall connection under combined loading
Published 2016“…For this purpose, constitutive law and mathematical model for the IBS members, including: walls and connections are formulated and finite element algorithm is developed. …”
Get full text
Get full text
Thesis -
14
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
15
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
16
Multi-Objective Optimal Energy Management of Nanogrid Using Improved Pelican Optimization Algorithm
Published 2025“…In order to demonstrate the effectiveness of the proposed algorithm, The outcomes of the simulation are juxtaposed with results obtained from the initial Pelican Optimisation Algorithm (POA), the Bat Algorithm, and the Improved Differential Evolutionary (IDE) Algorithm. …”
Article -
17
Development Of Load Control Algorithm For PV Microgrid
Published 2017Get full text
Get full text
Get full text
Article -
18
Composite slab numerical strength test method under partial connection approach
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Performance Analysis of a Real-Time Adaptive Prediction Algorithm for Traffic Congestion
Published 2018“…The approaches choose between five different prediction algorithms using the Root Mean Square Error model selection criterion. …”
Get full text
Get full text
Get full text
Article -
20
A study on data-driven impedance matching in four channels bilateral teleoperation
Published 2019“…The main objective of this research is to design and develop control algorithms to drive both sides of the master and slave system to attain symmetrical impedance between them. …”
Get full text
Get full text
Research Report
