Search Results - (( protocol distributed normal algorithm ) OR ( java application during algorithm ))
Search alternatives:
- distributed normal »
- application during »
- normal algorithm »
- java application »
- during algorithm »
-
1
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…Enhanced Distributed Channel Access (EDCA) protocol is used to support quality of service (QoS). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
Get full text
Get full text
Thesis -
3
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…The client invokes the server to establish WSDL contract and communicate via the relevant protocol. Two messages formats, normal and compressed (modified algorithm) with the size ranging 1MB - 22 MB were generated and executed 50 times in both web services. …”
Get full text
Get full text
Get full text
Thesis -
4
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…ETERS utilizes the Beta distribution-based trust function because recovery of trust values under attacks is faster in Beta distribution than Gaussian and Dirichlet distribution. …”
Get full text
Get full text
Article -
5
Evaluation of Clustering and Multi-hop Routing Protocols in Mobile Ad-hoc Sensor Networks
Published 2015“…A HEED (Hybrid, Energy-Efficient, Distributed) is one of the clustering algorithm for sensor networks. …”
Get full text
Get full text
Proceeding -
6
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
7
-
8
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Dose verification procedures in radiotherapy
Published 1999“…Our results showed that the algorithms (pencil beam) in the planning computer gave acceptable accuracy for our test cases. …”
Get full text
Get full text
Conference or Workshop Item -
10
Software reusability in green computing / Ibraheem Y. Y. Ahmaro
Published 2013“…Telecommuting is the main green computing approach while algorithmic efficiency, power management, voice over internet protocol (VOIP) and virtualization approaches are also commonly used methods. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
14
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
15
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols and ports other than the following two labeled packets: Transmission Control Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53 (53/UDP). …”
Get full text
Get full text
Thesis -
18
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
