Search Results - (( java implementation level algorithm ) OR ( using simulation protocol algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- simulation protocol »
- protocol algorithm »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Encryption selection for WLAN IEEE802.11G
Published 2013“…In this study, MATLAB was used for the simulation and the parameters for the simulation were different size of text file, type of encryption algorithms and type of encryption protocols. …”
Get full text
Get full text
Thesis -
3
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
Published 2008“…The performance analysis of the proposed algorithms was conducted by using the discrete-event simulator, OMNeT++. …”
Get full text
Get full text
Thesis -
4
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Routine insulin sliding scale protocol versus software driven algorithm (star protocol) for blood glucose management of critically ill patients in the ICU: A prospective observatio...
Published 2018“…The data collected was subsequently simulated with the software driven algorithm (STAR protocol) and results were analysed to determine if it was better at maintaining blood glucose levels within set targets of 6-10 mmol/L. …”
Get full text
Get full text
Thesis -
6
Performance Analysis of Routing Protocols in Wireless Sensor Networks
Published 2014“…Stable Election Protocol (SEP) routing protocol is also simulated using MATLAB in this project and the evaluation of the performance of the protocol will be discussed.…”
Get full text
Get full text
Final Year Project -
7
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
8
A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks
Published 2019“…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
Get full text
Get full text
Thesis -
9
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017“…This thesis presents the design of the smart protocol algorithms for simulating and controlling the residential street light. …”
Get full text
Get full text
Monograph -
10
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…The performance of CBH protocol is evaluated theoretically and using simulations. …”
Get full text
Get full text
Thesis -
11
Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm
Published 2006“…In this thesis, we use a fuzzy reasoning algorithm (FRA) as a highly adaptive algorithm to achieve that goal. …”
Get full text
Get full text
Thesis -
12
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…An enhanced routing protocol, which is used to route the BL video packets, namely the improved video transmission protocol (IVRP) was proposed. …”
Get full text
Get full text
Get full text
Thesis -
13
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
14
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
15
Software Development For Conversion Of Ip To Wireless Atm (Watm)
Published 2002“…In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. …”
Get full text
Get full text
Thesis -
16
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…To facilitate communication within the network, a routing protocol is used to dis- cover routes between nodes. …”
Get full text
Get full text
Thesis -
17
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
18
A new visual simulation tool for performance evaluation of MANET routing protocols
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
19
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
20
Adaptive medium access control protocol for dynamic medical traffic with quality of service provisioning in wireless body area network
Published 2024“…The proposed ADT-MAC protocol is simulated using Castalia and OMNeT++ to evaluate its performance against state-of-the-art MAC protocols. …”
Get full text
Get full text
Get full text
Article
