Search Results - (( protocol distributed model algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- learning algorithm »
- distributed model »
- java application »
- model algorithm »
-
1
New synchronization protocol for distributed system with TCP extension
Published 2013“…The thesis shows that it is possible to model the processes of distributed system in the form of a three dimensional matrix, so as to optimize fault-tolerant for mutual exclusion and critical section management. …”
Get full text
Get full text
Thesis -
2
-
3
Efficient access of replicated data in distributed database systems
Published 2001“…Specifically, this thesis present a new protocol called Three Dimensional Grid Structure (TDGS) protocol, to manage data replication in distributed database systems (DDS). …”
Get full text
Get full text
Thesis -
4
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…Enhanced Distributed Channel Access (EDCA) protocol is used to support quality of service (QoS). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks
Published 2019“…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
Get full text
Get full text
Thesis -
6
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…In this paper, we present an Authentication-Chains protocol which is a lightweight decentralized protocol for IoT authentication based on blockchain distributed ledger. …”
Get full text
Get full text
Article -
7
A conceptual automated negotiation model for decision making in the construction domain
Published 2023Conference Paper -
8
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
9
FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization
Published 2022“…This model was used to examine and test the FSM- GEAR Protocol and the previous M-GEAR. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. This algorithm depends on the adaptability of the concept in the ITSWTCM, I2TSWTCM and M2I2TSWTCM algorithms for affecting the fairness and multiple protocols. …”
Get full text
Get full text
Thesis -
12
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
Skype multimedia application traffic analysis on home Unifi network / Siti Fatimah Ramle
Published 2017“…Then, Skype traffic model is identified by fitted the raw data. Two parameter Cumulative Distributions Functions (CDF) is generated. …”
Get full text
Get full text
Thesis -
16
-
17
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
Get full text
Get full text
Article -
18
General purpose search and classification algorithms for distributed information access
Published 2000“…Users have to visit each URLs even though the page does not suit their requests.Therefore, it is vital to provide efficient and timely Internet search algorithm to ensure the success of distributed services, particularly to facilitate the current and future applications of national information superhighway. …”
Get full text
Get full text
Conference or Workshop Item -
19
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
20
Synchronization algorithm for remote heterogeneous database environment
Published 2015“…In this paper, we proposed a model and a unique algorithm to synchronize data between heterogeneous databases, in order to provide alternative synchronization paths, concurrency in operation and bidirectional mode of data exchange. …”
Get full text
Get full text
Article
