Search Results - (( java application based algorithm ) OR ( based simulation connection algorithm ))

Refine Results
  1. 1

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network by Noraziah, Adzhar, Shaharuddin, Salleh

    Published 2017
    “…In this paper, we present a routing algorithm based on enhanced simulated annealing technique to provide the connection between nodes in a semi-diagonal torus (SD-Torus) network. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Development of open platform controller for step-NC compliant CNC system by Chi Adam, Mohd Khairil Anbia

    Published 2020
    “…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Deterministic static sensor node placement in wireless sensor network based on territorial predator scent marking behavior by Abidin H.Z., Din N.M., Radzi N.A.M.

    Published 2023
    “…The main objectives considered in this paper are to achieve maximum coverage and minimum energy consumption with guaranteed connectivity. A simulation study has been carried out to compare the performance of the proposed algorithm implemented in two different single objective approaches with an Integer Linear Programming based algorithm and another biological inspired algorithm. …”
    Article
  8. 8

    A Distributed Energy Aware Connected Dominating Set Technique for Wireless Sensor Networks by Abd Aziz, Azrina, Sekercioglu, Ahmet

    Published 2012
    “…This paper presents an energy-efficient algorithm based on the connected dominating set (CDS) for a wireless sensor networks (WSN). …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Fuzzy logic-based intelligent scheme for enhancing QoS of vertical handover decision in vehicular ad-hoc networks by Azzali, Fazli, Ghazali, Osman, Omar, Mohd Hasbullah

    Published 2017
    “…In the next generation network, vertical handover can be started based on the user’s convenience or choice rather than connectivity reasons. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    WSN sensor node placement approach based on multi-objective optimization by Abidin H.Z., Din N.M., Radzi N.A.M.

    Published 2023
    “…Simulation results show that the WSN deployed with the proposed sensor node placement algorithm provides a larger coverage ratio, full connectivity and lower energy consumption. © 2014 IEEE.…”
    Conference Paper
  11. 11

    Sensor Node Placement in Wireless Sensor Network Using Multi-objective Territorial Predator Scent Marking Algorithm by Zainol Abidin H., Din N.M., Yassin I.M., Omar H.A., Radzi N.A.M., Sadon S.K.

    Published 2023
    “…A simulation study has been carried out to compare the performance of the proposed algorithm with the multi-objective evolutionary algorithm with fuzzy dominance-based decomposition and an integer linear programming algorithm. …”
    Article
  12. 12
  13. 13

    Enhancement Of Clustering Algorithm Using 3D Euclidean Distance To Improve Network Connectivity In Wireless Sensor Networks For Correlated Node Behaviours by Kalid Abdlkader Marsal Salih

    Published 2024
    “…This research uses an experimental based simulation using NS-2 and C++ programming. …”
    thesis::doctoral thesis
  14. 14

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…All the three proposed algorithms are evaluated using discrete event simulation, in particular Network Simulator tool (NS2), and compared with the latest routing algorithm (NCPR ) and fundamental algorithm (AODV) using five performance metrics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network by Puteri Azwa, Ahmad

    Published 2014
    “…Therefore, node placement model is develop to find the optimal node placement in order to maintain the coverage and guaranteed the connectivity in random deployment. The performance of Extended Virtual Force-Based Algorithm (EVFA) and Cuckoo Search (CS) algorithm are evaluated and EVFA shows the improvement of coverage area and exhibits a guaranteed connectivity compared to CS algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links by Waheed, Bassam M. S., Mohd Ali, Borhanuddin, Khatun, Sabira, Mohd Sidek, Roslina

    Published 2014
    “…An enhanced distributed algorithm is presented that is based on the marking process which is has been introduced in earlier work. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Photovoltaic System with INC MPPT Algorithm in MATLAB Simulink by F.Z. Hamidon, Nor Shafiqin, P.D. Abd. Aziz, N.H. Mohd Yunus, UniKL BMI

    Published 2013
    “…The MPPT works by automatically tracking the MPP of the PV array so that the overall PV system would have highest performance in terms of the power generated from the PV array will be optimally consumed.This paper presents the model-based design simulation analysis of grid-connected photovoltaic system with Incremental Conductance (INC) MPPT algorithms. …”
  19. 19

    An Intelligent Voltage Controller for a PV Inverter System Using Simulated Annealing Algorithm-Based PI Tuning Approach by Najeeb, Mushtaq, Muhamad, Mansor, Ramdan, Razali, Hamdan, Daniyal, Ali, Mahmood

    Published 2017
    “…This study associates an intelligent voltage controller based PI approach for PV electrical inverter by employing a meta-heuristic optimization algorithmic called a Simulated Annealing (SA) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor Actor Networks by Imran, Muhammad, Younis, Mohamed, Md Said, Abas, Hasbullah, Halabi

    Published 2010
    “…We present PCR, a hybrid novel distributed partitioning detection and connectivity restoration algorithm. It proactively identifies critical actors based on local topological information and designates appropriate backup nodes to handle their failure. …”
    Get full text
    Get full text
    Article