Search Results - (( java application matching algorithm ) OR ( wave optimization protocol algorithm ))
Search alternatives:
- optimization protocol »
- application matching »
- protocol algorithm »
- wave optimization »
- java application »
-
1
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. In this paper, an ant colony optimization (ACO) based WSN routing algorithm for IoT has been proposed and analyzed to enhance scalability, to accommodate node mobility and to minimize initialization delay for time critical applications in the context of IoT to find the optimal path of data transmission, improvising efficient IoT communications. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
UNDERWATER ACOUSTIC COMMUNICATIONS: DATA PACKET SIZE OPTIMIZATION WITH PERFORMANCE METRICS OF THROUGHPUT EFFICIENCY AND ENERGY EFFICIENCY QUALIFIED UNDER DIFFERENT BIT-ERROR-RATE
Published 2012“…These databases are to be indexed by the proposed algorithm as a look-up graph (or as look-up table) to determine the optimal data packet size for effective and efficient data transmission in the UWA channel. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
4
-
5
-
6
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
7
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
