Search Results - (( java application optimisation algorithm ) OR ( using robust protocol algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- protocol algorithm »
- java application »
- robust protocol »
- using robust »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
3
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
4
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
5
FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization
Published 2022“…The optimum network model has resulted in five cluster heads network clustering. This model was used to examine and test the FSM- GEAR Protocol and the previous M-GEAR. …”
Get full text
Get full text
Get full text
Thesis -
6
Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network
Published 2020“…To provide the necessary robustness, a new Cluster-based Adoptive Cooperative Algorithm (CACA) for VANET is introduced to improve the scalability of the network and reduce control overhead. …”
Get full text
Get full text
Thesis -
7
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
8
Reliable Path Selection Packet Forwarding Routing Protocol for Vehicular Adhoc Networks
Published 2019“…One of the crucial issues comprise of the design of scalable routing algorithms that are robust to rapid topology changes and frequent link disconnections caused by high mobility of vehicles. …”
Get full text
Get full text
Get full text
Thesis -
9
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
Published 2017Get full text
Get full text
Conference or Workshop Item -
10
Benchmarking Robust Machine Learning Models Under Data Imperfections in Real-World Data Science Scenarios
Published 2026“…Performance was evaluated using predictive metrics, robustness degradation rate (RDR), and computational efficiency, with statistical validation across repeated experimental runs. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…Next, the ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
text::Thesis -
12
-
13
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
Published 2012“…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
Get full text
Get full text
Thesis -
14
Node status detection and information diffusion in router network using scale-free network
Published 2014“…In this paper we have used the concept of scale-free network theory to design a more robust data dissemination approach which can be used in one dynamical Autonomous Systems (AS) to know the appearance and disappearance of nodes, and speedily propagate the information to all nodes in the routers network. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Energy efficient geographical and power based clustering algorithm for heterogeneous wireless sensor networks
Published 2011“…GPCA uses geographical position to enable scalability and robustness for dynamic networks. …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
18
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…Trust-based secure routing schemes are more effective than cryptographic routing protocols to convey energy-efficient data in WSNs since cryptographic protocols require high computation, more convergence time as well as storage space. …”
Get full text
Get full text
Article -
19
ADAPTIVE MODULATION AND CODING FOR WIMAX SYSTEMS
Published 2006“…First the SNR estimation using the three algorithms is implemented in Wimax system, based on the transmission protocols specified in Wimax. …”
Get full text
Get full text
Final Year Project -
20
An enhanced fingerprint template protection scheme
Published 2022“…The proposed FTP scheme was also evaluated using Burrows–Abadi– Needham (BAN) logic analysis for protocol robustness with resistance to replay attacks, stolen-verifier attacks, and perfect forward secrecy. …”
Get full text
Get full text
Thesis
