Search Results - (( developing effective protocol algorithm ) OR ( java implementation path algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- effective protocol »
- protocol algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…The first step of the proposed protocol involves the development of an energy efficient clustering algorithm which is appropriate for WSN with a sparse density topology. …”
Get full text
Get full text
Thesis -
6
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…The resulting approach can be further improved via continuous research and development (R&D) to produce a more reliable and resilient protocol. …”
Get full text
Get full text
Final Year Project -
7
GPS-less Localization Protocol for Underwater Acoustic Networks
Published 2008“…Second, involving more remote nodes becoming seed nodes for further discoveries. Four different algorithms have been investigated; (i) Farthest/Farthest Algorithm, (ii) Farthest/Nearest Algorithm, (iii) Nearest/Farthest Algorithm and (iv) Nearest/Nearest Algorithm. …”
Get full text
Get full text
Get full text
Article -
8
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…The resulting approach can be further improved via continuous research and development (R&D) to produce a more reliable and resilient protocol. …”
Get full text
Get full text
Final Year Project -
9
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…Thus, developing an effective routing algorithm to optimize network functionality is a big concern. …”
Article -
10
-
11
-
12
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. …”
Get full text
Get full text
Thesis -
13
-
14
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…The exhaustive simulation tests demonstrate that the EGA-LOQRP routing protocol improves performance effectively in the face of congestion and QoS assaults compared to the previous routing protocols like Ad hoc on-demand distance vector (AODV), ant colony optimization-AODV (ACO-AODV) and traffic aware segmentAODV (TAS-AODV).…”
Get full text
Get full text
Get full text
Article -
15
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…The exhaustive simulation tests demonstrate that the EGA-LOQRP routing protocol improves performance effectively in the face of congestion and QoS assaults compared to the previous routing protocols like Ad hoc on-demand distance vector (AODV), ant colony optimization-AODV (ACO-AODV) and traffic aware segmentAODV (TAS-AODV).…”
Get full text
Get full text
Get full text
Article -
16
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…The exhaustive simulation tests demonstrate that the EGA-LOQRP routing protocol improves performance effectively in the face of congestion and QoS assaults compared to the previous routing protocols like Ad hoc on-demand distance vector (AODV), ant colony optimization-AODV (ACO-AODV) and traffic aware segmentAODV (TAS-AODV).…”
Get full text
Get full text
Get full text
Article -
17
Performance evaluation of mobile ad hoc network in wireless LAN / Norfadhilah Hasan
Published 2005“…The work presented in this paper evaluates the performance of two MANET routing protocol known as Dynamic Source Routing (DSR) and Temporally Ordered Routing Algorithm (TORA). …”
Get full text
Get full text
Thesis -
18
Development Of An Automatic Calculation Method For Ct Dose Estimation Based On Individual Specific Size In Paediatric Population
Published 2022“…An automated calculation algorithm was developed on MATLAB platform for patient size measurement (Deff) and SSDE calculation. …”
Get full text
Get full text
Thesis -
19
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…Secondly, the algorithm Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with redundant packet forwarding by introducing a new method to reduce the redundant packet forwarding while in dense or sparse conditions to improve the energy consumption effectively. …”
Get full text
Get full text
Thesis -
20
Implementation of the Merkle-Hellman knapsack cryptosystem into station-to-station protocol / Nurzhulaika Yahya, Noor Izzah Agil and Nur ‘Afini Nordin
Published 2023“…Using the Merkle-Hellman knapsack cryptosystem as a part of the station-to-station protocol to improve the protocol's security or effectiveness might be considered integrating the Merkle-Hellman knapsack cryptosystem. …”
Get full text
Get full text
Student Project
