Search Results - (( java application based algorithm ) OR ( using message path algorithm ))
Search alternatives:
- application based »
- java application »
- path algorithm »
- message path »
-
1
Routing problem in rectangular mesh network using shortest path based Greedy method
Published 2019“…Therefore, developing a shortest path based routing algorithm is in need. In this research, Dijkstra's algorithm is used to establish the shortest connection for each net. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network
Published 2017“…Each of these nodes is connected to each other through interconnection networks and passes message using a standard message passing mechanism. …”
Get full text
Get full text
Get full text
Article -
3
Routing problem in rectangular mesh network using shortest path based Greedy method
Published 2019“…Therefore, developing a shortest path based routing algorithm is in need. In this research, Dijkstra's algorithm is used to establish the shortest connection for each net. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
STITCH-256: A dedicated cryptographic hash function
Published 2023“…Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. …”
Article -
5
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
6
ZLS: A next-door lightweight QoS aware location service technique for VANET on highways
Published 2014“…Similarly, a source can reach destination in the quickest possible way by sending uni-cast messages without using digital map or shortest path finding algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
7
An adaptive relay selection scheme for enhancing network stability in VANETs
Published 2020“…In this paper, we propose a new improvement to the mechanism of the Optimized Link State Routing Protocol(OLSR) protocol, named Cluster-based Adept Cooperative Algorithm (CACA), where each vehicle estimate a reliable low-overhead path using the cluster-based QoS algorithm. …”
Get full text
Get full text
Get full text
Article -
8
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
9
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
10
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
11
Routing problem in rectangular mesh network using Dijkstra’s based Greedy method
Published 2018“…Therefore, developing a shortest path based routing algorithm is in need. In this research, Dijkstra’s algorithm is used to establish the shortest connection for each net. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Path recovery mechanism in 6LoWPAN routing
Published 2010“…Hierarchical routing (HiLow) algorithm that uses dynamically assigned 16-bit unique short address as its interface identifier has an advantage of memory saving. …”
Get full text
Get full text
Conference or Workshop Item -
13
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
14
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…The results show the proposed model used in this research increases the percentage of useful ICMP traceback messages in UDP-based attack about 10% and 14% in the TCP-based attack when compared to the previous work. …”
Get full text
Get full text
Thesis -
15
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Artificial Bee Colony for Minimizing the Energy Consumption in Mobile Ad Hoc Network
Published 2019“…Hence, emphasizing the need to establish an efficient connection inside the network we use for a routing protocol to explore paths among nodes. …”
Get full text
Get full text
Article -
17
-
18
-
19
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…Factors contributing to the failure are a mathematical weakness found in the Boolean functions used by these cryptographic hash functions, linear message expansion and poor difusion in the step operation. …”
Get full text
Get full text
Thesis -
20
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article
