Search Results - (( java implementation case algorithm ) OR ( using computational protocol algorithm ))
Search alternatives:
- java implementation »
- implementation case »
- protocol algorithm »
- case algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…To facilitate communication within the network, a routing protocol is used to dis- cover routes between nodes. …”
Get full text
Get full text
Thesis -
5
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
6
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…The performance of CBH protocol is evaluated theoretically and using simulations. …”
Get full text
Get full text
Thesis -
7
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
8
Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm
Published 2012“…It also describes the design of a novel on-demand routing algorithm. Most of the proposed algorithms use a blind ooding technique during the route discovery process. …”
Get full text
Get full text
Article -
9
-
10
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Task-based assessment on various optimization protocols of computed tomography Pulmonary Angiography examination
Published 2021“…The standard CTPA protocols were altered on its tube potential, pitch factor and iterative reconstruction algorithm (IR). …”
Get full text
Get full text
Get full text
Article -
15
Performance enhancement of AIMD algorithm for congestion avoidance and control
Published 2011“…National Chiao Tung University’s network simulation (NCTUns) has been used in this development to compare the new algorithm with the older versions and determine its advantages over the older versions. …”
Get full text
Get full text
Thesis -
16
-
17
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
18
-
19
-
20
