Search Results - (( java implementation from algorithm ) OR ( quality function protocol algorithm ))
Search alternatives:
- java implementation »
- implementation from »
- protocol algorithm »
- from algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
-
3
Task-based assessment on various optimization protocols of computed tomography Pulmonary Angiography examination
Published 2021“…An image quality phantom, Catphan-600 was utilized in this study for assessing the image quality of CTPA protocols under 128-multislice CT scanner (Philips Brilliance iCT, USA). …”
Get full text
Get full text
Get full text
Article -
4
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
5
A hybrid algorithm for improving the quality of service in MANET
Published 2018“…The CAABO optimizes the path selection in the ad-hoc on-demand distance vector (AODV) routing protocol. The test results show that with the aid of the CAABO, the AODV manifests energy and delay-aware routing protocol.…”
Get full text
Get full text
Article -
6
Advanced Multiple Access Schemes for Multimedia Traffic over Wireless Channels
Published 2001“…A detailed comparison and discussion of implementation and robustness issues is presented in this thesis to help the design engineer choose the right protocol that suits the application scenario. In the context of the AR-TDMA protocol, results show that the priority algorithms improve real-time traffic Quality-of-Service (QoS). …”
Get full text
Get full text
Thesis -
7
Quality of service performances of three mobile ad hoc network protocols
Published 2009“…The protocols included the Dynamic Source Routing (DSR), Ad Hoc On-demand Distance Vector (AODV) and Temporally Ordered Routing Algorithm (TORA) protocol. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A hybrid algorithm for improving the quality of service in MANET
Published 2023“…The CAABO optimizes the path selection in the ad-hoc on-demand distance vector (AODV) routing protocol. The test results show that with the aid of the CAABO, the AODV manifests energy and delay-aware routing protocol. � IJASEIT.…”
Article -
9
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
10
Reliable Fuzzy-Based Multi-Path Routing Protocol Based on Whale Optimization Algorithm to Improve QOS in 5G Networks for IOMT Applications
Published 2024“…The Whale Optimization Algorithm (WOA) enhances the routing protocol performance. …”
Article -
11
Route Optimization System
Published 2005“…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
Get full text
Get full text
Final Year Project -
12
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
13
Impact of low-dose protocols on computed tomography of lung cancer screening on the intrinsic performance metrics: a phantom study
Published 2023“…Conclusions: To sum up, research is being conducted to determine how CT image quality is affected by low dose CT acquisition parameters and IR algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Optimal forwarding routing protocol in ipv6-based wireless sensor network
Published 2009“…Thus, programming code of the OF routing protocol algorithm is written using NesC language, which is a high level programming language that emulates the syntax and functionality of hardware description languages, and provides components for communication, thread coordination, and hardware abstraction. …”
Get full text
Get full text
Thesis -
16
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
Get full text
Get full text
Conference or Workshop Item -
17
A web-based implementation of k-means algorithms
Published 2022“…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Network game (Literati) / Chung Mei Kuen
Published 2003“…It should be an interesting, time and value worth topic to research on. By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
Get full text
Get full text
Thesis -
19
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
20
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…E-Certificate helps eliminate many problems that is associated with physical printed certificate such costs, management, and forgery problem. Even though implementation of such E-Certificate have been implemented around the globe, it has not been implemented for workshops in UiTM. …”
Get full text
Get full text
Thesis
