Search Results - (( using ad protocol algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- protocol algorithm »
- application mining »
- java application »
- mining algorithm »
- ad protocol »
- using ad »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm
Published 2006“…We will present the various application of that algorithm to ad-hoc routing protocols. Then, we will focus on four major applications that are the core of any ad-hoc routing protocol. …”
Get full text
Get full text
Thesis -
4
Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm
Published 2012“…This paper presents that the proposed on demand routing algorithm performs better in mobile ad-hoc environment than other traditional algorithms. …”
Get full text
Get full text
Article -
5
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
Published 2008“…Ad hoc On-Demand Distance Vector (AODV) routing protocol is a reactive protocol in Mobile Ad hoc Network (MANET). …”
Get full text
Get full text
Thesis -
6
Comparison of DSR, AODV and DSDV routing protocols in mobile ad-hoc networks: A survey
Published 2014“…A mobile ad hoc network (MANET) is a collection of mobile nodes that is connected through a wireless medium forming rapidly changing topologies.Mantes are infrastructure less and can be set up anytime, anywhere.We have conducted survey of protocol properties of various MANET routing algorithms and analyzed them.The routing algorithms considered are classified into three categories proactive (table driven) , reactive (on demand) and Hybrid protocol.The algorithms considered are Dynamic Source Routing (DSR), Ad-hoc On-Demand Distance Vector Routing (AODV) and Destination sequence Vector (DSDV) have been proposed to solve the multi hop routing problem in Ad-hoc networks.The comparison among three routing protocols are based on the various protocol property parameters such as Routing overhead, packet delivery ratio, end-to-end delay, path optimality, and throughput are some metrics commonly used in the comparisons.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
8
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
Published 2006“…In this thesis the ad hoc routing protocol AODV is used and modified to examine the interconnection between a mobile ad hoc network and the Internet. …”
Get full text
Get full text
Thesis -
9
A modification of Shamir's Three-Pass protocol by implementing one-time pad algorithm / Nur Khairunnisa' Kusman, Nurul Hanis Abd Rashid and An Nur Ameera Zamani
Published 2019“…In order to improve security, a proper algorithm should be implemented in the three-pass protocol by adding phases at starting and ending of the process. …”
Get full text
Get full text
Student Project -
10
Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks
Published 2016“…The mechanism is developed to find the shortest secure path and to reduce overhead using the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
A design of redirect link failure protocol based on dynamic source routing for mobile ad hoc networks
Published 2011“…The characteristics of ad hoc networks are that they are decentralized, self-organized, self-deployed, and they possess dynamic network topology.All mobile nodes in ad hoc network communicate with each other directly or through intermediate nodes by using routing protocols algorithm. …”
Get full text
Get full text
Get full text
Get full text
Monograph -
12
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
Published 2008“…The main objectives of this research are to enhance the FIP and decrease the recovery delays in reliable multicast protocol for mobile ad hoc networks using suggested approaches. …”
Get full text
Get full text
Thesis -
13
GSAR: Greedy Stand-Alone Position-Based Routing protocol to avoid hole problem occurance in Mobile Ad Hoc Networks
Published 2014“…The Greedy Forwarding Strategy (GFS) has been the most used strategy in position-based routing protocols. …”
Get full text
Get full text
Get full text
Thesis -
14
The effects of MAC protocols on ad hoc on-demand distance vector (AODV) routing protocol
Published 2009Get full text
Working Paper -
15
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…To facilitate communication within the network, a routing protocol is used to dis- cover routes between nodes. …”
Get full text
Get full text
Thesis -
16
Enhancing DSR protocol performance in mobile ad hoc network using ACK reply
Published 2009“…This paper presents a new method to improve performance of DSR in Ad Hoc Network. We present an analysis of DSR protocol and propose our algorithm to improve the performance of DSR protocol by using ACK reply path as a backup route when an original route fails in Mobile Ad Hoc networks. …”
Get full text
Get full text
Get full text
Article -
17
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…Ad hoc on-demand distance vector routing protocol (AODV) is a commonly used protocol in MANET. …”
Get full text
Get full text
Get full text
Thesis -
18
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Reduced latency in restricted flooding routing protocol for mobile ad hoc network.
Published 2007“…Packet delivery and latency are several performance metrics used to determine the effectiveness of a new routing algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
