Search Results - (( java implementation phase algorithm ) OR ( using ad using algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- phase algorithm »
- using algorithm »
- using ad »
- ad using »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
3
Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm
Published 2012“…This paper presents that the proposed on demand routing algorithm performs better in mobile ad-hoc environment than other traditional algorithms. …”
Get full text
Get full text
Article -
4
-
5
Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm
Published 2006“…We will present the various application of that algorithm to ad-hoc routing protocols. Then, we will focus on four major applications that are the core of any ad-hoc routing protocol. …”
Get full text
Get full text
Thesis -
6
Security mechanism for wireless Mobile Ad Hoc Networks (MANET)
Published 2006“…The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
Get full text
Get full text
Student Project -
7
A novel clustering algorithm for mobile ad hoc networks based on determination of virtual links’ weight to increase network stability
Published 2014“…The performance of new algorithm is analyzed by using computer simulation. …”
Get full text
Get full text
Get full text
Article -
8
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
Published 2008“…The performance analysis of the proposed algorithms was conducted by using the discrete-event simulator, OMNeT++. …”
Get full text
Get full text
Thesis -
9
Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun
Published 2019“…Based on the findings, a multi-sensor data correlation algorithm is developed. The algorithm is validated using real time radar and ADS-B data from Department of Civil Aviation Malaysia (CAAM). …”
Get full text
Get full text
Get full text
Thesis -
10
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…All the three proposed algorithms are evaluated using discrete event simulation, in particular Network Simulator tool (NS2), and compared with the latest routing algorithm (NCPR ) and fundamental algorithm (AODV) using five performance metrics. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Controlling algorithm for energy consumption of radio bandwidth to manage coverage area problem
Published 2024Conference Paper -
13
Predictive modeling of biodiesel-derived glycerol valorization to value-added products using machine learning algorithms
Published 2024Get full text
Final Year Project -
14
-
15
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…This thesis proposes an algorithm for increasing the stability of the cluster by selecting the most stable cluster head, maintaining the cluster structure with minimum maintenance overhead, and finding the best performance routing algorithm for use over MANET. …”
Get full text
Get full text
Thesis -
16
-
17
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
18
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
19
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…To validate the research, the researcher presents case study using GLOMOSIM simulation platform with AODV ad hoc routing protocols. …”
Get full text
Get full text
Get full text
Thesis -
20
