Search Results - (( protocol distributed normal algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- distributed normal »
- stemming algorithm »
- normal algorithm »
- java application »
-
1
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…Enhanced Distributed Channel Access (EDCA) protocol is used to support quality of service (QoS). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
Get full text
Get full text
Thesis -
3
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…The client invokes the server to establish WSDL contract and communicate via the relevant protocol. Two messages formats, normal and compressed (modified algorithm) with the size ranging 1MB - 22 MB were generated and executed 50 times in both web services. …”
Get full text
Get full text
Get full text
Thesis -
4
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…ETERS utilizes the Beta distribution-based trust function because recovery of trust values under attacks is faster in Beta distribution than Gaussian and Dirichlet distribution. …”
Get full text
Get full text
Article -
5
Evaluation of Clustering and Multi-hop Routing Protocols in Mobile Ad-hoc Sensor Networks
Published 2015“…A HEED (Hybrid, Energy-Efficient, Distributed) is one of the clustering algorithm for sensor networks. …”
Get full text
Get full text
Proceeding -
6
-
7
Dose verification procedures in radiotherapy
Published 1999“…Our results showed that the algorithms (pencil beam) in the planning computer gave acceptable accuracy for our test cases. …”
Get full text
Get full text
Conference or Workshop Item -
8
Software reusability in green computing / Ibraheem Y. Y. Ahmaro
Published 2013“…Telecommuting is the main green computing approach while algorithmic efficiency, power management, voice over internet protocol (VOIP) and virtualization approaches are also commonly used methods. …”
Get full text
Get full text
Thesis -
9
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols and ports other than the following two labeled packets: Transmission Control Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53 (53/UDP). …”
Get full text
Get full text
Thesis
