Search Results - (( java implementation modified algorithm ) OR ( based construction protocol algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…CBH shows that by grouping the nodes into clusters and having only one replica in each cluster, has minimized the number of replicas involved in constructing read and write quorums. This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources by Al‐Sharafi, Ali Mohammed Ali

    Published 2008
    “…This thesis proposes some techniques to enhance the AMTree protocol. First we propose two algorithms to improve the handoff process in AMTree protocol. …”
    Get full text
    Get full text
    Thesis
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  6. 6
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology by Lee, Feng Wei

    Published 2022
    “…Thus, we introduce a new code-based key exchange protocol that is constructed using the Permuted Goppa Syndrome Decoding Problem. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…For EL video packets, an enhanced routing algorithm was proposed to route the Enhance Layer (EL) packets, namely, Energy Sensible and Route Stability Based Routing Protocol (ESRSBRP) which is used over Mobile network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links by Waheed, Bassam M. S., Mohd Ali, Borhanuddin, Khatun, Sabira, Mohd Sidek, Roslina

    Published 2014
    “…An enhanced distributed algorithm is presented that is based on the marking process which is has been introduced in earlier work. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…It provides a general framework for constructing and analyzing authentication protocols in realistic models of communication networks. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Clustering Approach In Wireless Sensor Networks Based On K-Means: Limitations And Recommendations by Hassan, Ali Abdul-hussian, Md Shah, Wahidah, Husien, Ali Mohamed, Talib, Mohammed Saad, Mohammed, Ali Abdul Jabbar, Othman, Mohd Fairuz Iskandar

    Published 2019
    “…Clustering approach in wireless sensor network is very important, the structure of cluster and how to improve it is a first challenge that faced the developers, because of it represent as a base for design the cluster-based routing protocol. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    A self-adaptive agent-based simulation modelling framework for dynamic processes by Ling, Loo Yim, Dr.

    Published 2023
    “…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
    text::Thesis
  20. 20

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…To show the benefit of the ENP protocol, it has been utilized as the neighbor protocol with the CDS and both are integrated into AODV routing protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis