Search Results - (( java implementation modified algorithm ) OR ( based modeling protocol algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- protocol algorithm »
- modeling protocol »
- based modeling »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…By applying the proposed algorithm, the throughput of EDCA protocol was increased by 42.9% and it can support 14 voice users rather than 11 in the default EDCA protocol. …”
Get full text
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
5
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
6
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…Thus, the LDPC code encoder model is developed to identify a low complexity encoding algorithm of LDPC code for the DF protocol relay system. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…To validate the proposed ECG-based authentication protocol model, the FAR and FRR analysis is done and then followed by the complexity analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization
Published 2022“…The research objective is to have a low-power consumption protocol applied in a model network based on the actual environment suitable for illegal logging characteristics. …”
Get full text
Get full text
Get full text
Thesis -
10
A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks
Published 2019“…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
Get full text
Get full text
Thesis -
11
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
12
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
13
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
14
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
15
Cohesive token passing algorithm utilizing software agents
Published 2010“…The core of the new protocol is based on the circulation mechanism of the token. …”
Get full text
Get full text
Article -
16
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…For EL video packets, an enhanced routing algorithm was proposed to route the Enhance Layer (EL) packets, namely, Energy Sensible and Route Stability Based Routing Protocol (ESRSBRP) which is used over Mobile network. …”
Get full text
Get full text
Get full text
Thesis -
17
A design of redirect link failure protocol based on dynamic source routing for mobile ad hoc networks
Published 2011“…If an alternative route is not available, the source node will reinitiate route discovery process to find a new route, which may result in the decrease of the performance of DSR protocol. Therefore, to avoid this situation, we propose an extension of DSR protocol called Redirect Link Failure Protocol (RLFP) in order to solve link failure problem and update routes in the route cache of DSR protocol.RLFP consists of three parts.The first part is based on Link Prediction Algorithm, which utilises signal power strength from the received packets to predict the link before any break down happens.The second part is based on Link Solution Model, which contains sub-models that can solve and redirect link failure.Finally, the Enhanced Route Cache Model, which possesses a scheme that is called “Updating Route Scheme”, to avoid stale routes.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
18
Routine insulin sliding scale protocol versus software driven algorithm (star protocol) for blood glucose management of critically ill patients in the ICU: A prospective observatio...
Published 2018“…However, the incidence of severe hypoglycaemic events (BG < 2.2 mmol/L) was 0.05% using the ISS arm whereas there was no incidence of hypoglycaemia in the STAR protocol arm. Despite both arms showing similar performance in terms of BG therapy, there is still much room for improvement with the STAR protocol as simulations were made based on Caucasian population pharmacokinetic and pharmacodynamics models. …”
Get full text
Get full text
Thesis -
19
Computational model for energy aware TDMA-based MAC protocol for wireless sensor network system
Published 2007Get full text
Get full text
Conference or Workshop Item -
20
Improvement of routing protocol in wireless sensor network for energy consumption to maximize network lifetime
Published 2013“…This document is a study about hierarchical cluster-based routing protocol algorithm where the implementation was done using Matlab simulator to study the performance of this algorithm in term of lifetime. …”
Get full text
Get full text
Get full text
Get full text
Thesis
