Search Results - (( process optimization protocol algorithm ) OR ( java applications using algorithm ))
Search alternatives:
- optimization protocol »
- protocol algorithm »
- applications using »
- java applications »
- using algorithm »
-
1
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…This thesis proposes some techniques to enhance the AMTree protocol. First we propose two algorithms to improve the handoff process in AMTree protocol. …”
Get full text
Get full text
Thesis -
2
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…This algorithm only applies the optimization scaling factor at the bit node processing of the variable node operation. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
-
5
New synchronization protocol for distributed system with TCP extension
Published 2013“…Optimization of process allocation causes to decrease the network traffic and fairer allocation, and therefore,optimization of fault-tolerance. …”
Get full text
Get full text
Thesis -
6
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
7
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
8
Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks
Published 2016“…The mechanism is developed to find the shortest secure path and to reduce overhead using the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. The new method is called the Daddy Long-Legs Algorithm (PGO-DLLA), which modifies the standard AODV and optimizes the routing process. …”
Get full text
Get full text
Get full text
Thesis -
9
MAC Protocol for Opportunistic Spectrum Access in Cognitive Radio System
Published 2011“…In this paper, we study MAC protocol design for OSA in Cognitive Radio (CR) ad hoc network under Partially Observable Markov Decision Process (POMDP) algorithm that maximizes achievable throughput for SUs with sufficient protection to PUs. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
High Throughput Routing Algorithm Metric for OLSR Routing Protocol in Wireless Mesh Networks
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
11
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
12
Enhancing NoC-based MPSoC performance: a predictive approach with ANN and guaranteed convergence arithmetic optimization algorithm
Published 2023“…The main idea of the proposed method is to develop a prediction model, speci‚cally an Arti‚cial Neural Network (ANN) optimized using the Guaranteed Convergence Arithmetic Optimization Algorithm (GCAOA-ANN), for predicting the utilized routing algorithm in NoC-based MPSoC platform during the DSE process. …”
Get full text
Get full text
Article -
13
-
14
Optimal Sensing for Opportunistic Spectrum Access in Cognitive Radio
Published 2010“…In this paper, we study MAC protocol design and optimal sensing for OSA in Cognitive Radio (CR) ad hoc network under Partially Observable Markov Decision Process (POMDP) algorithm that maximizes achievable throughput for SUs with sufficient protection to PUs. …”
Get full text
Get full text
Article -
15
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
16
Performance Analysis of Routing Protocols in Wireless Sensor Networks
Published 2014“…It is one the most popular routing protocols based on cluster-head routing algorithm. …”
Get full text
Get full text
Final Year Project -
17
High throughput routing algorithm metric for OLSR routing protocol in wireless mesh networks
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Bat optimized link state routing protocol for energy-aware mobile ad-hoc networks
Published 2023“…In this paper, a new Bat Optimized Link State Routing (BOLSR) protocol is proposed to improve the energy usage of the Optimized Link State Routing (OLSR) protocol in the MANET. …”
Article -
19
Prolonging lifetime of wireless sensor networks with mobile base station using particle swarm optimization
Published 2011Get full text
Working Paper -
20
The impact of tube current and iterative reconstruction algorithm on dose and image quality of infant CT head examination
Published 2022“…Five protocols were established and denoted by P1, P2, P3, P4, and P5. …”
Get full text
Get full text
Article
