Search Results - (( network detection path algorithm ) OR ( java application optimized algorithm ))
Search alternatives:
- optimized algorithm »
- network detection »
- java application »
- detection path »
- path algorithm »
-
1
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
2
Energy-Aware Routing Hole Detection Algorithm in the Hierarchical Wireless Sensor Network
Published 2019“…In this paper a novel energy efficient routing hole detection (EEHD) algorithm is presented, on the detection of routing hole, the periodic re-clustering is performed to avoid the long detour path. …”
Get full text
Get full text
Get full text
Article -
3
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. …”
Get full text
Get full text
Get full text
Thesis -
4
Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET
Published 2022“…Lower trust level node is selfish node and they are detected and ignored from path. It increases the lifespan of network and throughput and minimizes the end to end delay and energy consumption. …”
Get full text
Get full text
Article -
5
Identification and mitigation of non-line-of-sight path effect using repeater for hybrid ultra-wideband positioning and networking system
Published 2021“…In conclusion, the proposed method is capable of mitigating the NLOS path effect on both indoor positioning and data networking systems.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
7
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
8
-
9
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
10
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
11
Node status detection and information diffusion in router network using scale-free network
Published 2014Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Monkeypox disease detection using Convolutional Neural Network (CNN) / Nur Farhain Humaira Ghanami
Published 2024“…Thus, this research project aims to develop a prototype for detecting Monkeypox Disease Detection using Convolutional Neural Network (CNN) and detect monkeypox disease, which can assist in reducing its spread and improve patient outcomes. …”
Get full text
Get full text
Thesis -
13
-
14
AUTOMATED GUIDED ROBOT (AGR)
Published 2007“…The paper describes the network algorithms developed and used in the design process of the AGR including simulations and circuit designs done for the prototype. …”
Get full text
Get full text
Final Year Project -
15
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
16
HTS : a hierarchical method for load balancing in autonomous networks.
Published 2008“…Proposed algorithm fulfills at two steps. Firstly overload detection function through an explorer algorithm to construct overloaded link table due to disruption link. …”
Get full text
Get full text
Article -
17
A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan
Published 2024“…Furthermore, PMTRF exhibits its resilience and adaptability to changing network conditions, accurately detects faulty switches, which is useful for fore-cast switch failures based on switch reliability within the network. …”
Get full text
Get full text
Get full text
Thesis -
18
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…This work proposes an improved framework for FDA system to ensure a robust, intelligent network of FDA control panels in real-time. Methods/Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. …”
Get full text
Get full text
Get full text
Article -
19
-
20
