Search Results - (( java implementation 5s algorithm ) OR ( using interactive protocol algorithm ))
Search alternatives:
- interactive protocol »
- java implementation »
- protocol algorithm »
- implementation 5s »
- 5s algorithm »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Deniable authentication protocol based on factoring and discrete logarithm problems
Published 2022“…In terms of communication overhead, the non-interactive protocol is more effective than the interactive protocol. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
-
5
-
6
-
7
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
8
Performance analysis of multipath routing based on source routing
Published 2010Get full text
Working Paper -
9
-
10
Vehicular ad-hoc network (vanets) for electrical vehicle charging management
Published 2025text::Thesis -
11
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. This application can be installing into the mobile phone.…”
Get full text
Get full text
Thesis -
12
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
13
Quality of service performances of three mobile ad hoc network protocols
Published 2009“…The thesis proposed to evaluate the Quality of Service (QoS) performances of three types MANET protocols. The protocols included the Dynamic Source Routing (DSR), Ad Hoc On-demand Distance Vector (AODV) and Temporally Ordered Routing Algorithm (TORA) protocol. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
An Educational Tool Aimed at Learning Metaheuristics
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
16
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
17
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…In particular, important issues such as how smartcard applications can be modeled using UML techniques and how UML can be used to sketch the operations for implementing a secure access using smartcard has been addressed.…”
Get full text
Get full text
Thesis -
18
Multipath routing protocol based on cross-layer approach for MANET
Published 2017“…In an effort to improve the performance of MANETs, there has been increased in protocols that rely on cross-layer interaction between different layers. …”
Get full text
Get full text
Get full text
Article -
19
-
20
