Search Results - (( protocol distribution practices algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- distribution practices »
- protocol distribution »
- application stemming »
- stemming algorithm »
- java application »
-
1
Secure lightweight client for cloud-based E-Health Model
Published 2023“…This protocol enables the client to transfer its computational operations to a specified proxy server securely. …”
Get full text
Get full text
Get full text
Thesis -
2
Dose verification procedures in radiotherapy
Published 1999“…In radiotheraphy the accuracy of the radiation dose to be delivered to patient is vital.In the current practice the dose to be delivered by the treatment machine is calculated using computer planning system which utilised computational algorithms based on mathematical model that takes into account the shape of treatment beam, target geometry and tissue inhomogeneities present in the patient. …”
Get full text
Get full text
Conference or Workshop Item -
3
Software reusability in green computing / Ibraheem Y. Y. Ahmaro
Published 2013“…Telecommuting is the main green computing approach while algorithmic efficiency, power management, voice over internet protocol (VOIP) and virtualization approaches are also commonly used methods. …”
Get full text
Get full text
Thesis -
4
Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks
Published 2022“…This study developed an optimized variation of the DV-Hop localization algorithm for anisotropic wireless sensor networks. …”
Get full text
Get full text
Thesis -
5
Benchmarking Robust Machine Learning Models Under Data Imperfections in Real-World Data Science Scenarios
Published 2026“…Machine learning systems deployed in real-world environments frequently encounter data imperfections such as noise, missing values, class imbalance, and distribution shifts. Despite substantial progress in model development, most evaluation protocols rely on clean benchmark datasets, creating a gap between laboratory performance and operational reliability. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Feasibility of quantum cryptography with AES for secure communication
Published 2026“…The model was simulated using Qiskit, achieving an average quantum bit error rate of 0.00%, protocol efficiency of 49.72 %, and quantum fidelity of 1.000 under certain conditions. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
A new model of application response time for VoIP over WLAN and fixed WiMAX
Published 2015“…The Voice over Internet Protocol (VoIP) and Wireless Local Area Networks (WLANs) has observed the fastest growth in the world of communication. …”
Get full text
Get full text
Conference or Workshop Item
