Search Results - (( protocol attributes based algorithm ) OR ( java application stemming algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study by Hassan, Ali Abdul Hussian, Md Shah, Wahidah, Jabbar Mohammed, Ali Abdul, Othman, Mohd Fairuz Iskandar

    Published 2017
    “…Our objective is exploring the literature to present a brief discussion of these algorithms, as well as examine and compare some of distributed, centralized and hybrid clustering algorithm based on several attributes. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm by Hintaw, Ahmed Jameel

    Published 2023
    “…The proposed cryptosystem utilized two algorithms: a dynamic variant of the Advanced Encryption Standard (D-AES) and Key policy attribute base encryption (KP-ABE). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Performance Analysis of Routing Protocols in Wireless Sensor Networks by Htet, Kyaw Min

    Published 2014
    “…It is one the most popular routing protocols based on cluster-head routing algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network by Khairi, Kharina

    Published 2003
    “…The project carried out was a study of a single-channel optical Local Area Network (LAN) based on an improved CSMA/CD protocol that was adapted from the conventional one. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Reliable Fuzzy-Based Multi-Path Routing Protocol Based on Whale Optimization Algorithm to Improve QOS in 5G Networks for IOMT Applications by Al-Mukhtar F.S., Jaaz Z.A., Hamad A.H.

    Published 2024
    “…The Whale Optimization Algorithm (WOA) enhances the routing protocol performance. …”
    Article
  6. 6

    A Patent Technique of Jaccard Discrete (J-DIS) Similarity Clustering Algorithm by Imtiaz, Sharjeel, Saadiah, Yahya

    Published 2014
    “…Mostly, k-Means algorithm finds out similarity between the object based on distance vector for smallest dataset. …”
    Get full text
    Get full text
    Journal
  7. 7

    Mobility management for IoT: a survey by M. Ghaleb, Safwan, Subramaniam, Shamala, Ahmed Zukarnain, Zuriati, Muhammed, Abdullah

    Published 2016
    “…IP mobility management is utilized as a mechanism to resolve these issues. The management protocols introduced to support mobility has evolved from host-based to network-based mobility management protocols. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…Also, user attributes are stored in the block storage using an InterPlanetary File System (IPFS) protocol to eliminate the concept of centralizing storage. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Conceptual deployment models to secure cloud computing / Hajar Ziglari by Ziglari, Hajar

    Published 2012
    “…The next step will be about development and corresponding interfaces and design patterns for applications to fit the deployment models and working on security protocols and algorithms in the proposed models to have security support in the cryptography part.…”
    Get full text
    Get full text
    Thesis
  12. 12

    A self-adaptive agent-based simulation modelling framework for dynamic processes by Ling, Loo Yim, Dr.

    Published 2023
    “…Agent-based simulation (ABS) modelling had been a prevalent approach for simulation of dynamic processes of various domains. …”
    text::Thesis
  13. 13
  14. 14

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
    Get full text
    Get full text
    Thesis