Search Results - (( java implementation learning algorithm ) OR ( making based protocol algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- protocol algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
New algorithms to minimize handoff latency in AMTree protocol
Published 2009“…This allows programmers to enhance existing protocols or deploy new protocols. AMTree protocol is an active network based protocol that makes sending packets to receivers, after source migration, an efficient process. …”
Get full text
Get full text
Get full text
Article -
3
Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution
Published 2014“…It makes the cluster-based routing protocols less efficient. …”
Get full text
Get full text
Thesis -
4
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
5
A conceptual automated negotiation model for decision making in the construction domain
Published 2023Conference Paper -
6
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
8
GSAR: Greedy Stand-Alone Position-Based Routing protocol to avoid hole problem occurance in Mobile Ad Hoc Networks
Published 2014“…The DRESM algorithm is responsible for making forwarding decisions based on multiple routing metrics. …”
Get full text
Get full text
Get full text
Thesis -
9
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
10
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…Some approach had been proposed to make routing protocol becomes e±cient and correct. …”
Get full text
Get full text
Thesis -
11
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…AMTree is an active network based protocol intended to make the sending packets to the tree after source migration an efficient process without much modifications to the multicast tree. …”
Get full text
Get full text
Thesis -
12
Reliable low power network protocol in IoT for agriculture field
Published 2024“…The data link layer protocol handles the Medium Access Control (MAC) of the mesh network efficiently using algorithms based on the Scheduling sub-cycle of the Fast, Adaptive, and Energy-efficient Multi-channel-multi-path (FAEM) protocol by Liew et al. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
A qualitative comparison of position-based routing protocols for ad-hoc networks
Published 2009“…This paper presents an overview and a qualitative comparison of the existing Ad-Hoc routing protocols that make forwarding decisions based on the geographical position of a packet's destination. …”
Get full text
Get full text
Get full text
Article -
14
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…First, the proposed incomplete cooperative game theoretic based MAC (GT-MAC) protocol, improves on the existing wireless sensor MAC protocols by offering significant network performance and lifetime extensions over the existing IEEE 802.15.4\Zigbee standards based WSN protocols. …”
Get full text
Get full text
Thesis -
15
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…Third, the LEACH routing protocol is modified by combining ELEC routing protocol with it. …”
Get full text
Get full text
Thesis -
16
A true random number generator for crypto embedded systems
Published 2006“…In this paper, we design a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers. …”
Get full text
Get full text
Article -
17
A scheduled activity energy aware distributed clustering algorithm for wireless sensor networks with nonuniform node distribution
Published 2014“…Nonuniform node deployment makes the cluster-based routing protocol less efficient in wireless sensor networks (WSNs). …”
Get full text
Get full text
Get full text
Article -
18
Optimal forwarding routing protocol in ipv6-based wireless sensor network
Published 2009“…Currently, a popular routing network protocol in WSNs is not compatible with IP-Based network _and can not provide Internet connection. …”
Get full text
Get full text
Thesis -
19
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
20
Position-based QoS multicast routing protocol for mobile Ad Hoc Networks
Published 2010Get full text
Get full text
Get full text
Proceeding Paper
