Search Results - (( java implementation tree algorithm ) OR ( using case protocol algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- protocol algorithm »
- tree algorithm »
- case protocol »
- using case »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017“…Thus, smart protocol algorithm is developed to replace the previous system. …”
Get full text
Get full text
Monograph -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
Reliable low power network protocol in IoT for agriculture field
Published 2024“…Existing research in energy efficient network protocols have problems with reliability or weaknesses that make them unsuitable for direct use in agriculture use cases. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…To facilitate communication within the network, a routing protocol is used to dis- cover routes between nodes. …”
Get full text
Get full text
Thesis -
6
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
7
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…This is an extension to AMTree Protocol. The results from experiments show that handoff latency using the new algorithms is much lower than using AMTree handoff procedure in both cases, i.e. when the source connects to a subscribed base station or not subscribed base station. …”
Get full text
Get full text
Thesis -
8
Hypertension Among Dental Patients: A Single Institution Experience And Development Of A Working Clinical Algorithm For Dental Practitioners
Published 2026journal::journal article -
9
The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2010“…In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the New-AIMD algorithm to measure the queue length and end-to-end delays and we will use the NCTUns simulator to get the results after make the modification of the mechanism. …”
Get full text
Get full text
Article -
10
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
11
Embedded Ethernet System For Real-Time Communication
Published 2018“…The Ethernet network model is used to analyze the performance of the backoff algorithm in a different number of nodes. …”
Get full text
Get full text
Monograph -
12
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…The survey concluded that protocol designers must focus on the development and implementation of fire-adaptive routing protocols, incorporating optimal fault tolerance routing algorithms that adapt seamlessly to unforeseen environmental changes, including fire incidents. …”
Article -
13
-
14
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
Published 2013“…Secondly, to increase the efficiency of EBA-15.4MAC algorithm, we propose a new scheme to resolve the problem of access collision arising from the small number of backoff exponent used by CSMA-CA. …”
Get full text
Get full text
Thesis -
15
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…A synchronization model is presented with the aid of the implemented Contiki's implicit network time synchronization scheme. Finally, a case study of a WSN-based SHM system using developed embedded data filtering and transmission algorithms to reduce data communication is performed and taken place on a concrete beam at Civil Engineering Structure Laboratory, UPM. …”
Get full text
Get full text
Thesis -
16
Clustering network traffic utilization
Published 2013“…Classification of network traffic using distinctive characteristic application is not ideal for P2P and HTTP protocols. …”
Get full text
Get full text
Article -
17
-
18
A NEW ENERGY EFFICIENT ADAPTIVE HYBRID ERROR CORRECTION TECHNIQUE FOR UNDERWATER WIRELESS SENSORS NETWORKS
Published 2011“…When the battery is depleted the sensor is of no use anymore. So designing energy efficient communication protocols is an important issue for underwater sensors networks. …”
Get full text
Get full text
Thesis -
19
-
20
Implement routing protocols for VANET in a one-way environment
Published 2024“…The MATLAB software was used to analyze the performance of the routing protocols for the VANET. …”
Conference Paper
