Search Results - (( developing construction protocol algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- construction protocol »
- application testing »
- protocol algorithm »
- testing algorithm »
- java application »
-
1
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…The first step of the proposed protocol involves the development of an energy efficient clustering algorithm which is appropriate for WSN with a sparse density topology. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol
Published 2006“…This article describes the study of improving the proposed protocol called Receiverinitiated WDM Tree Construction (R-IWDMTC) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
5
Strategies for effective value management practice in construction industry
Published 2017“…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Development of wireless data acquisiton system using LoRa technology for construction of PID control system
Published 2025text::Thesis -
7
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
Published 2014“…The Wireless Sensor Network (WSN) is defined to connect the sensors by using a set of protocols. The IEEE 802.15.4 standard includes the required protocols to construct a WSN. …”
Get full text
Get full text
Thesis -
8
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
9
Hypertension Among Dental Patients: A Single Institution Experience And Development Of A Working Clinical Algorithm For Dental Practitioners
Published 2026journal::journal article -
10
-
11
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…It provides a general framework for constructing and analyzing authentication protocols in realistic models of communication networks. …”
Get full text
Get full text
Thesis -
16
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
17
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
18
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…This information can be collected with the aid of neighbor protocol. In this thesis an enhanced neighbor protocol (ENP) has been developed to collect and maintain 2-hop neighbor information at each node. …”
Get full text
Get full text
Get full text
Thesis -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009“…In addition, at the end we will give some future directions, which can be helpful in order to construct the algorithms for such environments.…”
Get full text
Get full text
Conference or Workshop Item
