Search Results - (( java implementation tree algorithm ) OR ( network implementing software algorithm ))
Search alternatives:
- implementing software »
- network implementing »
- java implementation »
- implementation tree »
- software algorithm »
- tree algorithm »
-
1
Cohesive token passing algorithm utilizing software agents
Published 2010“…This encompasses the implementation in the area of Wave Division Multiplexing (WDM) networks and Mobile Adhoc Networks (MANET). …”
Get full text
Get full text
Article -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Security mechanism for wireless Mobile Ad Hoc Networks (MANET)
Published 2006“…The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
Get full text
Get full text
Student Project -
4
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…It is implemented using Verilog HDL software and simulated using the ModelSim software. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
5
Fiber-Wireless testbed using software defined radio for protocol and algorithm testing
Published 2023“…The results show that algorithms implemented in the testbed are in-line with the expected results. …”
Article -
6
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis -
7
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
8
Implementing artificial neural networks and genetic algorithms to solve modeling and optimisation of biogas production
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Training functional link neural network with ant lion optimizer
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. …”
Get full text
Get full text
Proceeding Paper -
11
Letter recognition using backpropagation algorithm
Published 2010“…The objective of tbi project is to implement Backpropagation Neural Network for letter recognition task. …”
Get full text
Get full text
Undergraduates Project Papers -
12
-
13
Multi-Backpropagation network
Published 2002“…The learning mechanism for Neural Network is its learning algorithm. Backpropagation (or backprop) algorithm is one of the well-known algorithms in neural networks. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Implementing artificial neural networks and genetic algorithms to solve modeling and optimisation of blogas production
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…For the implementation aspect, software-driven media processing was studied. …”
Get full text
Get full text
Thesis -
17
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…It is implemented using Verilog HDL software and simulated using the ModelSim software. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
Published 2000“…This paper presents a pipeline implementation of the Secure Hash Algorithm, SUA-I. This design is targeted for the Altera FlexlOKE50 Field Programmable Gate Array (FPGA) on a PCI card. …”
Get full text
Get full text
Conference or Workshop Item -
19
Software Development For Conversion Of Ip To Wireless Atm (Watm)
Published 2002“…The project considers the various aspects of carrying IP over a WATM channel, by retransforming the IP data to a WATM cell, ready to be transmitted over a wireless channel.Analysis and simulation shows various advantages and disadvantages in the above-mentioned method when performed using software. Furthermore, discussion about the hardware methods of implementing communication protocols shows a way for the engineer to choose the right method for his future development of the protocols for implementation. …”
Get full text
Get full text
Thesis -
20
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014Get full text
Get full text
Article
