Search Results - (( java implementation developing algorithm ) OR ( network implementation clustering algorithm ))
Search alternatives:
- implementation developing »
- implementation clustering »
- network implementation »
- java implementation »
-
1
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
2
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
3
Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm
Published 2012“…This document is a study about LEACH algorithm where the implementation was done using OMNeT++ network simulator to study the performance of this algorithm in term of network lifetime. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
An Efficient Clustering Technique for Mobile Wireless Sensor Networks
Published 2014“…LEACH clustering algorithm will be implemented on random mobility network. …”
Get full text
Get full text
Final Year Project -
5
Modified Kohonen network algorithm for selection of the initial centres of Gustafson-Kessel algorithm in credit scoring
Published 2017“…A good clustering analysis implemented by good Initial Centres of clusters should be selected. …”
Get full text
Get full text
Get full text
Article -
6
An improvement of resource consumption in wireless sensor network (WSN) using compressive sensing / Maizatul Akmal Ibrahim and Norkhushaini Awang
Published 2022“…The Compressive Sensing (CS) algorithm has been implemented to the network through Cluster Head (CH) to further the lifetime longevity. …”
Get full text
Get full text
Get full text
Article -
7
Autonomous and deterministic supervised fuzzy clustering
Published 2010Get full text
Get full text
Article -
8
Modeling and Analysis of New Hybrid Clustering Technique for Vehicular Ad Hoc Network
Published 2023“…Many researchers have proposed algorithms to improve the network performance of vehicular ad hoc network (VANET) clustering techniques for different applications. …”
Article -
9
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
10
Improvement of routing protocol in wireless sensor network for energy consumption to maximize network lifetime
Published 2013“…For a given number of data collecting sensor nodes, the number of control and management nodes can be systematically adjusted to reduce energy consumption quite significantly and prolongs the life time of sensor network. This document is a study about hierarchical cluster-based routing protocol algorithm where the implementation was done using Matlab simulator to study the performance of this algorithm in term of lifetime. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
12
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…Many clustered routing algorithms have been developed to address various issues like energy efficiency, network lifetime, and hotspot problems. …”
Article -
13
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
14
MOSIX: Implementation, trend and benchmark in Malaysia
Published 2023“…The main focuses are on MOSIX implementation, survey and benchmark on MOSIX performance. …”
Conference paper -
15
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
16
A survey of state of the art: hierarchical routing algorithms for wireless sensor networks
Published 2014“…In this article, we will present a review for the state of the art for recent hierarchical algorithms. Moreover, we will use criteria to classify the hierarchical algorithms that never used before in any article, which is the mechanism that implemented in the hierarchical algorithm such as clustering, chaining, or hybrid between cluster and chain.…”
Get full text
Get full text
Get full text
Article -
17
Development of compound clustering techniques using hybrid soft-computing algorithms
Published 2006“…The hierarchical fuzzy clustering algorithm developed in this work assign the overlapping structures (structures having more than one activity) to more than one clusters if their fuzzy membership values are significantly high for those clusters. …”
Get full text
Get full text
Monograph -
18
Parallel genetic algorithms for shortest path routing in high- performance computing / Mohd Erman Safawie Che Ibrahim
Published 2012“…This project focuses on step-up cluster computing and a parallel Genetic Algorithm. …”
Get full text
Get full text
Thesis -
19
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…For example VANET is one of the examples of adhoc network implementation of WSN, which monitor and update traffic management system. …”
Get full text
Get full text
Conference or Workshop Item -
20
An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network
Published 2019“…The element of Shortest Path First (SPF) Algorithm that is used in a routing protocol will be implemented. …”
Get full text
Get full text
Get full text
Get full text
Article
