Search Results - (( protocol attributes based algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- protocol attributes »
- stemming algorithm »
- attributes based »
- java application »
-
1
Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study
Published 2017“…Our objective is exploring the literature to present a brief discussion of these algorithms, as well as examine and compare some of distributed, centralized and hybrid clustering algorithm based on several attributes. …”
Get full text
Get full text
Get full text
Article -
2
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Published 2023“…The proposed cryptosystem utilized two algorithms: a dynamic variant of the Advanced Encryption Standard (D-AES) and Key policy attribute base encryption (KP-ABE). …”
Get full text
Get full text
Thesis -
3
Performance Analysis of Routing Protocols in Wireless Sensor Networks
Published 2014“…It is one the most popular routing protocols based on cluster-head routing algorithm. …”
Get full text
Get full text
Final Year Project -
4
Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network
Published 2003“…The project carried out was a study of a single-channel optical Local Area Network (LAN) based on an improved CSMA/CD protocol that was adapted from the conventional one. …”
Get full text
Get full text
Thesis -
5
Reliable Fuzzy-Based Multi-Path Routing Protocol Based on Whale Optimization Algorithm to Improve QOS in 5G Networks for IOMT Applications
Published 2024“…The Whale Optimization Algorithm (WOA) enhances the routing protocol performance. …”
Article -
6
A Patent Technique of Jaccard Discrete (J-DIS) Similarity Clustering Algorithm
Published 2014“…Mostly, k-Means algorithm finds out similarity between the object based on distance vector for smallest dataset. …”
Get full text
Get full text
Journal -
7
Mobility management for IoT: a survey
Published 2016“…IP mobility management is utilized as a mechanism to resolve these issues. The management protocols introduced to support mobility has evolved from host-based to network-based mobility management protocols. …”
Get full text
Get full text
Get full text
Article -
8
-
9
-
10
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Also, user attributes are stored in the block storage using an InterPlanetary File System (IPFS) protocol to eliminate the concept of centralizing storage. …”
Get full text
Get full text
Thesis -
11
Conceptual deployment models to secure cloud computing / Hajar Ziglari
Published 2012“…The next step will be about development and corresponding interfaces and design patterns for applications to fit the deployment models and working on security protocols and algorithms in the proposed models to have security support in the cryptography part.…”
Get full text
Get full text
Thesis -
12
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Agent-based simulation (ABS) modelling had been a prevalent approach for simulation of dynamic processes of various domains. …”
text::Thesis -
13
-
14
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
Get full text
Get full text
Thesis
