Search Results - (( developing issues connection algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- connection algorithm »
- developing issues »
- issues connection »
- validation using »
- java validation »
- using algorithm »
-
1
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…This random deployment causes issues such as coverage hole, overlapping and connectivity failure that contributes to the performance of coverage and connectivity of WSN. …”
Get full text
Get full text
Get full text
Thesis -
2
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Before incorporating the optimization methods, a sizing algorithm for large-scale GCPV systems was developed. …”
Get full text
Get full text
Thesis -
3
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
4
-
5
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…Connectivity is a critical issue in WSNs, as the data collected needs to be sent to the base station or the processing centers. …”
Get full text
Get full text
Thesis -
6
Performance enhancement of AIMD algorithm for congestion avoidance and control
Published 2011“…One major issue arose in 80s when routers got congested and the connections collapsed because they were pushed to their limits by the competing robots for connection. …”
Get full text
Get full text
Thesis -
7
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
8
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…Thus, there is a room for further enhancement to develop a routing algorithm as to mitigate the drawbacks with the NCPR. …”
Get full text
Get full text
Get full text
Thesis -
9
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
10
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009“…In this paper we will explore the developments of some of the important routing algorithms, and a survey with different comparisons, those have been proposed for the partially connected underwater environments. …”
Get full text
Get full text
Conference or Workshop Item -
11
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009“…In this paper we will explore the developments of some of the important routing algorithms, and a survey with different comparisons, those have been proposed for the partially connected underwater environments. …”
Get full text
Get full text
Conference or Workshop Item -
12
Quality of service management algorithms in WiMAX networks
Published 2015“…Four algorithms have been proposed and developed in this research. …”
Get full text
Get full text
Thesis -
13
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Optimization grid scheduling with priority base and bees algorithm
Published 2014“…The suggested procedure means that a newly developed algorithm can implement the schedule grid task while accounting for priorities and deadlines to decrease the completion time required for the tasks. …”
Get full text
Get full text
Get full text
Thesis -
15
A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system
Published 2021“…It can also ensure an economic and environment friendly system where the existing algorithms are limited to serve these. The proposed algorithm can mitigate the available power issues for hybrid PV-BESS connected system and it can also minimize the operating cost by dispatching the generation units optimally. …”
Get full text
Get full text
Article -
16
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
17
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Dual authentication for bluetooth connection
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
Get full text
Get full text
Get full text
Article -
19
The evolution and trend of chain code scheme
Published 2008Get full text
Get full text
Get full text
Article -
20
Development of automatic pest sampling and detection system for cash crops
Published 2019“…The process of insect detection and counting is starting with image acquisition, image preprocessing, and morphological operations. Connected components algorithm was implemented for insect detection and counting. …”
Get full text
Get full text
Thesis
