Search Results - (( developing small protocol algorithm ) OR ( java application new algorithm ))

Refine Results
  1. 1
  2. 2

    Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions by Abbas O.K., Abdullah F., Radzi N.A.M., Salman A.D., Abdulkadir S.J.

    Published 2025
    “…The survey concluded that protocol designers must focus on the development and implementation of fire-adaptive routing protocols, incorporating optimal fault tolerance routing algorithms that adapt seamlessly to unforeseen environmental changes, including fire incidents. …”
    Article
  3. 3

    Proactive multi-copy routing protocol for urban vehicular ad hoc network by Hassan, Aslinda, Bahaman, Nazrulazhar

    Published 2016
    “…This paper focuses on developing a proactive multi-copy routing protocol with carry and forward mechanism that is able to deliver packets from a source vehicle to a destination vehicle at a small delivery delay. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Proactive multi-copy routing protocol for urban vehicular ad hoc network by Hassan, Aslinda, Bahaman, Nazrulazhar

    Published 2015
    “…This paper focuses on developing a proactive multi-copy routing protocol with carry and forward mechanism that is able to deliver packets from a source vehicle to a destination vehicle at a small delivery delay. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…The performance evaluations proved that a small-scale yet robust ML-IDS algorithm is successfully developed to classify traffic and blocking attack traffic, while proposed ML-RA successfully offer better delay and throughput performance than the RIPv2 routing protocol.…”
    text::Thesis
  9. 9
  10. 10

    Relay suitability based routing protocol for video streaming in vehicular ad-hoc network by Omar Abdulmaged, Hammood

    Published 2022
    “…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Position-based multicast routing in mobile ad hoc networks: an analytical study by Qabajeh, Mohammad M., Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Qabajeh, Liana K.

    Published 2012
    “…Most of the existing QoS multicast routing protocols are designed with flat topology and small networks in mind. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Efficient Discovery Protocol for Ubiquitous Communication in Wireless Environment by Zarrin, Javad

    Published 2009
    “…In this research a new mechanism and algorithm is designed to improve current wireless service discovery protocols. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18
  19. 19
  20. 20