Search Results - (( intelligence mac protocol algorithm ) OR ( intelligence based access algorithm ))
Search alternatives:
- protocol algorithm »
- intelligence based »
- intelligence mac »
- access algorithm »
- based access »
-
1
Cohesive token passing algorithm utilizing software agents
Published 2010“…The communications domain has utilized the implementation of protocols for a wide spectrum of applications. This encompasses Medium Access Control (MAC) protocols. …”
Get full text
Get full text
Article -
2
An Energy Efficient Mac Layer Design for Wireless Sensor Network
Published 2008“…The proposed MAC protocol with an extra radio management technique together with backoff management procedure can achieve 70% more energy saving than MAC IEEE 802.15.4 standard. …”
Get full text
Get full text
Thesis -
3
-
4
-
5
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
Article -
6
-
7
-
8
-
9
-
10
Intelligent dynamic bandwidth allocation algorithm in upstream EPONs
Published 2023“…An upstream access scheme for Ethernet passive optical networks, called the intelligent fuzzy-logic-based dynamic bandwidth allocation algorithm (IFLDBA) has been proposed. …”
Article -
11
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
-
15
-
16
-
17
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
text::Thesis -
18
Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea
Published 2018“…This research develops a knowledge-based system by using computational intelligent approaches based on Boosting algorithms on decision trees augmented by pruning techniques and Association Rule Mining. …”
Get full text
Get full text
Thesis -
19
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Short Survey -
20
