Search Results - (( using communication tree algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- using communication »
- communication tree »
- implication based »
- java implication »
- tree algorithm »
-
1
-
2
An efficient scalable batch-rekeying scheme for secure multicast communication using multiple logical key trees
Published 2014“…In this paper, a new scheme based on multiple key trees is proposed. Instead of using only a single key tree multiple key trees are used and at the end of each batch time the algorithm decides which tree will be used to update the keys. …”
Get full text
Get full text
Get full text
Article -
3
A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree
Published 2008Get full text
Get full text
Conference or Workshop Item -
4
Dynamic tree-splitting algorithm for massive random access of M2M communications in IoT networks
Published 2021“…In this article, we introduce a dynamic tree-splitting (DTS) algorithm to resolve RACH collisions for delay-sensitive devices during burst arrival scenarios. …”
Get full text
Get full text
Get full text
Article -
5
-
6
A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree
Published 2009Get full text
Working Paper -
7
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
journal::journal article -
8
-
9
-
10
-
11
An efficient model for indoor radio signal prediction and coverage estimation / Md. Sumon Sarker
Published 2011“…BFS is used to generate the search space tree and Branch-And- Bound terminology is to avoid the unnecessary generation of the sub-tree using proposed bounding functions. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
15
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023“…The algorithms include Support Vector Machine (SVM), Naïve Bayes, and Decision Tree. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis -
20
