Search Results - (( java implementation level algorithm ) OR ( parameter evaluation protocol algorithm ))
Search alternatives:
- implementation level »
- parameter evaluation »
- java implementation »
- evaluation protocol »
- protocol algorithm »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…By applying the proposed algorithm, the throughput of EDCA protocol was increased by 42.9% and it can support 14 voice users rather than 11 in the default EDCA protocol. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
6
New synchronization protocol for distributed system with TCP extension
Published 2013“…According to previous researches that evaluated performance to measure faulttolerance in this thesis, the network performances are evaluated and compared. …”
Get full text
Get full text
Thesis -
7
Routine insulin sliding scale protocol versus software driven algorithm (star protocol) for blood glucose management of critically ill patients in the ICU: A prospective observatio...
Published 2018“…The objective of the study was to evaluate a specifically designed software driven algorithm for the establishment of tight glycaemic control with lesser risks of potentially harmful hypoglycaemia in critically ill patients in the ICU and to compare the results with the routine glucose management protocol i.e. insulin sliding scale, used by the ICU in UMMC. …”
Get full text
Get full text
Thesis -
8
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…The proposed routing algorithm is simulated using MATLAB for performance evaluations. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Assessing the efficacy of machine learning algorithms for syncope classification: A systematic review
Published 2024“…The aims of the study were to systematically evaluate available machine learning (ML) algorithm for supporting syncope diagnosis to determine their performance compared to existing point scoring protocols. …”
Get full text
Get full text
Article -
10
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
11
Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network
Published 2020“…The comparison-based simulation of both default and modified routing protocols is carried out under certain performance parameters; Packet Delivery Ratio (PDR), Average End-to-End Delay (AE2ED), Normalized Routing Load (NRL), Average number of MPR, and Stability. …”
Get full text
Get full text
Thesis -
12
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
13
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
14
An optimized aggregate marker algorithm for bandwidth fairness improvement in classifying traffic networks
Published 2016“…Additionally, the assured service is designed for applications relying on the Transmission Control Protocol (TCP). This article analyses and evaluates a new time sliding window traffic marker algorithm called the Optimized time sliding window Three Colour Marker (OtswTCM). …”
Get full text
Get full text
Get full text
Article -
15
Impact of low-dose protocols on computed tomography of lung cancer screening on the intrinsic performance metrics: a phantom study
Published 2023“…Introduction: This research aims to assess the task-based performance of low dose CT lung examination with different acquisition parameters, evaluate the acquisition parameters of lung cancer in low dose CT lung examination, and explore the effect of the iterative reconstruction (IR) algorithm on the image quality of low dose CT for CT lung examination. …”
Get full text
Get full text
Conference or Workshop Item -
16
The impact of tube current and iterative reconstruction algorithm on dose and image quality of infant CT head examination
Published 2022“…Hence, optimization of CT acquisition parameter should be evaluated and monitored accordingly.…”
Get full text
Get full text
Article -
17
The Implementation of a Machine Learning-based Routing Algorithm in a Lab-Scale Testbed
Published 2024“…High quality of service (QoS) requires monitoring and controlling parameters such as delay and throughput. Due to network complexity, conventional QoS-improving routing algorithms (RAs) may be impractical. …”
Conference Paper -
18
Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm
Published 2012“…In this paper, we present the design and performance evaluation of a new efficient on demand routing protocol for mobile ad-hoc networks. …”
Get full text
Get full text
Article -
19
Development Of An Automatic Calculation Method For Ct Dose Estimation Based On Individual Specific Size In Paediatric Population
Published 2022“…This study aims to evaluate the current paediatric CT protocols and associated dose received by paediatric from CT scans. …”
Get full text
Get full text
Thesis -
20
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item
