Search Results - (( process setting protocol algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- protocol algorithm »
- learning algorithm »
- setting protocol »
- java application »
- process setting »
-
1
-
2
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…Existing on-demand routing protocols perform route discovery process by flooding the network with a query message (RREQs) requesting a route to the destination. …”
Get full text
Get full text
Get full text
Thesis -
3
Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links
Published 2014“…The proposed algorithm is integrated with AODV routing protocol to generate a connected dominating set that will be responsible on flooding activity. …”
Get full text
Get full text
Get full text
Article -
4
GSAR: Greedy Stand-Alone Position-Based Routing protocol to avoid hole problem occurance in Mobile Ad Hoc Networks
Published 2014“…The Greedy Forwarding Strategy (GFS) has been the most used strategy in position-based routing protocols. The GFS algorithm was designed as a high-performance protocol that adopts hop count in soliciting shortest path. …”
Get full text
Get full text
Get full text
Thesis -
5
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…EBCRA solves the issue of redundant re-transmission of RREQ packet and propose a routing algorithm that deal with the broadcast storm problem which is widely practiced in MANET routing protocol. …”
Get full text
Get full text
Get full text
Thesis -
6
Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm
Published 2012“…It also describes the design of a novel on-demand routing algorithm. Most of the proposed algorithms use a blind ooding technique during the route discovery process. …”
Get full text
Get full text
Article -
7
-
8
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…AC complement algorithm was used to compare the different in each set of data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
Published 2014“…The Wireless Sensor Network (WSN) is defined to connect the sensors by using a set of protocols. The IEEE 802.15.4 standard includes the required protocols to construct a WSN. …”
Get full text
Get full text
Thesis -
10
Development of wireless data acquisiton system using LoRa technology for construction of PID control system
Published 2025text::Thesis -
11
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
13
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…Specifically, several aspects of authentication protocols were studied, and new definitions of this problem were presented in various settings depending on the underlying network. …”
Get full text
Get full text
Thesis -
14
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
15
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
16
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article -
17
-
18
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…The simulation process was conducted using Network Simulator-3 (NS-3) and the performance of these packet scheduling algorithms were evaluated based on the performance metrics of throughput, delay, packet loss ratio (PLR), energy consumption rate (ECR), and EE for the voice over IP (VoIP), video and File Transfer Protocol (FTP) applications. …”
Get full text
Get full text
Thesis -
19
-
20
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article
