Search Results - (( problem solving protocol algorithm ) OR ( java applications testing algorithm ))

Refine Results
  1. 1

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Deniable authentication protocol based on factoring and discrete logarithm problems by Nek Abd Rahman, Normahirah, Ismail, Eddie Shahril, Laham, Mohamed Faris

    Published 2022
    “…The security of the algorithm depends on how difficult it is to simultaneously solve factoring and discrete logarithm problems.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime by Ahmad, Noor Azlan

    Published 2008
    “…The combination metrics of the lifetime and the sequence number in the table entry is used to solve the problem of the discarded active path information when the lifetime is expired. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    The influence of students’ concept of mole, problem representation ability and mathematical ability on stoichiometry problem solving by Taha, Hafsah, Hashim, Rosnani, Ismail, Zurida, Jusoff, Kamaruzaman, Khoo, Yin Yin

    Published 2014
    “…The challenge of enhancing students’ performance in solving stoichiometry problems remain a daunting task as many resort to just teaching how solve stoichiometry problems algorithmically. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    MAC Protocol for Opportunistic Spectrum Access in Cognitive Radio System by Armi, Nasrullah, M Saad, M Naufal, Yusoff, Mohd Zuki, Arshad, Muhammad

    Published 2011
    “…The derivation of greedy approach proves that sensing problem can be solved either optimally or approximate the optimal solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Performance enhancement of AIMD algorithm for congestion avoidance and control by Jasem, Hayder Natiq

    Published 2011
    “…Additive Increase Multiplicative decrease (AIMD) is one of the best principles offered to solve this problem. This study is also in this field and offers an enhanced version of this mechanism. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Comparison of DSR, AODV and DSDV routing protocols in mobile ad-hoc networks: A survey by Abdala, Tarek Mosbah, Dasalla, Valeriano A., Daud, Nasarudin

    Published 2014
    “…A mobile ad hoc network (MANET) is a collection of mobile nodes that is connected through a wireless medium forming rapidly changing topologies.Mantes are infrastructure less and can be set up anytime, anywhere.We have conducted survey of protocol properties of various MANET routing algorithms and analyzed them.The routing algorithms considered are classified into three categories proactive (table driven) , reactive (on demand) and Hybrid protocol.The algorithms considered are Dynamic Source Routing (DSR), Ad-hoc On-Demand Distance Vector Routing (AODV) and Destination sequence Vector (DSDV) have been proposed to solve the multi hop routing problem in Ad-hoc networks.The comparison among three routing protocols are based on the various protocol property parameters such as Routing overhead, packet delivery ratio, end-to-end delay, path optimality, and throughput are some metrics commonly used in the comparisons.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A design of redirect link failure protocol based on dynamic source routing for mobile ad hoc networks by Ghazali, Osman, Hassan, Suhaidi, M. Kadhum, Mohammed

    Published 2011
    “…If an alternative route is not available, the source node will reinitiate route discovery process to find a new route, which may result in the decrease of the performance of DSR protocol. Therefore, to avoid this situation, we propose an extension of DSR protocol called Redirect Link Failure Protocol (RLFP) in order to solve link failure problem and update routes in the route cache of DSR protocol.RLFP consists of three parts.The first part is based on Link Prediction Algorithm, which utilises signal power strength from the received packets to predict the link before any break down happens.The second part is based on Link Solution Model, which contains sub-models that can solve and redirect link failure.Finally, the Enhanced Route Cache Model, which possesses a scheme that is called “Updating Route Scheme”, to avoid stale routes.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  11. 11

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…EBCRA solves the issue of redundant re-transmission of RREQ packet and propose a routing algorithm that deal with the broadcast storm problem which is widely practiced in MANET routing protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Optimal Sensing for Opportunistic Spectrum Access in Cognitive Radio by Armi, Nasrullah, M Saad, M Naufal, Yusoff, Mohd Zuki, Arshad, Muhammad

    Published 2010
    “…The derivation of greedy approach proves that sensing problem can be solved either optimally or approximate the optimal solution. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Enhancing problem-solving skills of novice programmers in an introductory programming course by Malik S.I., Mathew R., Al-Sideiri A., Jabbar J., Al-Nuaimi R., Tawafak R.M.

    Published 2023
    “…Internet protocols; Learning algorithms; Learning systems; Semantics; Teaching; Introductory programming; Introductory programming course; Problem solving skills; Programming exercise; Programming knowledge; Semi structured interviews; Students' behaviors; Traditional approaches; Students…”
    Article
  16. 16

    An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design. by Khatun, Sabira

    Published 2006
    “…This invention solves the problem of long delay and packet loss incurred during handover through enhancement of handover management in Mobile IPv6. …”
    Get full text
    Patent
  17. 17

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…The matrix is defined as such based on weight, which is able to solve problems of critical sections in order to obtain better state of fault-tolerance. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…In conclusion, it will give insight on the current challenges and open up to new solution to solve the problem of missing tag detection.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Lightweight and Efficient Dynamic Cluster Head Election Routing Protocol for Wireless Sensor Networks by Yagoub, Mudathir F. S., Khalifa, Othman Omran, Abdelmaboud, Abdelzahir, Korotaev, Valery, Kozlov, Sergei A., Rodrigues, Joel J. P. C.

    Published 2021
    “…Unfortunately, the WSNs are still immature, and suffering in several aspects. This paper aims to solve some of the downsides in existing routing protocols for WSNs; a Lightweight and Efficient Dynamic Cluster Head Election routing protocol (LEDCHE-WSN) is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal