Search Results - (( its applications modified algorithm ) OR ( based application service algorithm ))*

Refine Results
  1. 1

    Security analysis of data transmission in an IoT based platform for telemedicine by Olanrewaju, Rashidah Funke, Amuda, Idowu Rahaman, Hassan Abdalla Hashim, Aisha

    Published 2021
    “…This study proposes a modified folded pipeline architecture for resource restriction applications with an AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Optimization Method Using Modified Harmony Search For Coverage And Energy Efficiency In Wireless Sensor Network by Halim, Nurul Hamimi

    Published 2018
    “…Coverage and energy efficiency metrics are two fundamental issues for almost all types of application in wireless sensor network (WSNs).Coverage reflects how well an area is monitored by sensor nodes and in energy efficient networks where less energy is consumed to provide the same level of services.These twin specifics are presented to evaluate the performance of a wireless sensor network.Due to its simplicity and ease of analysis,full coverage is widely implemented in many theoretical studies.However,sometimes full coverage is not the best way to represent some real-world application due to its strong restrictions and its deterministic characteristics.In this thesis,Modified Harmony Search algorithm (MHS) is proposed to achieve a sensor node deployment such that the covered area is optimal and data transfer has low energy consumption.Through computer simulations, experimental results verified that the proposed method improved the coverage of area in compare to some related methods.Based on the result obtain from every experiments,coverage area percentage performance is affected by the number of hotspots.This is shown by Harmony Search (HS) based method where the coverage area percentage increases as the number of hotspot increase. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector by Abdulkader, Zaid A.

    Published 2018
    “…Since AODV has no security mechanisms, malicious nodes can perform many attacks just by not behaving according to the AODV rules, so that our framework can provide secure communication in VANET via modifying AODV. Our framework categorises the requirements for the VANET protection design via modifying AODV into three: Insure the Availability of VANET and its Services Algorithm (IAVSA), Protect Data Dissemination Algorithm (PDDA), and Secure Vehicles Authentication Algorithm (SVAA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…All the replication servers established its connection through interfaces. Furthermore, similar with the Service Oriented Architecture (SOA) and the structure is flexible enough to modify i.e.; adding and removing replication server. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network by Al-Kharasani, Nori Mohammed Abdulkarem

    Published 2020
    “…To provide the necessary robustness, a new Cluster-based Adoptive Cooperative Algorithm (CACA) for VANET is introduced to improve the scalability of the network and reduce control overhead. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets by Pradhan, Biswajeet

    Published 2006
    “…Moreover, most of these algorithms are based either on Fourier transmission or on first order wavelet techniques. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Bats echolocation-inspired algorithms for global optimisation problems by Nafrizuan, Mat Yahya

    Published 2016
    “…The works related to swarm intelligence algorithms include the development of the algorithm itself, its modification and improvisation as well as its application in solving global optimisation problems. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20