Search Results - (( java application rsa algorithm ) OR ( _ evaluation ((sensor algorithm) OR (path algorithm)) ))
Search alternatives:
- java application »
- sensor algorithm »
- application rsa »
- path algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
The impact of clustering on the average path length in wireless sensor networks
Published 2015“…This property is evaluated by comparing the performance of several clustering algorithms with respect to the average path length. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
A multi-objective parametric algorithm for sensor-based navigation in uncharted terrains
Published 2023“…Sensor-based motion planning is one the most challenging tasks in robotics where various approaches and algorithms have been proposed to achieve different planning goals. …”
Article -
5
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…That is why a complementary security measure, trust evaluation system, is adopted here. In this paper, a secure bio-inspired WSN (Wireless Sensor Network) routing protocol based on ant colony optimization (ACO) algorithm for IoT has been proposed and analyzed to find secure and optimal path that is energy-efficient as well as aiming at providing trust in IoT environment. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
AUTOMATED GUIDED ROBOT (AGR)
Published 2007“…Algorithm conversion to C code programming has been done throughout the project for the obstacle avoidance and path planning algorithms based upon the GA platform ofAI.…”
Get full text
Get full text
Final Year Project -
7
A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments
Published 2013“…Sampling-based motion planning is a class of randomized path planning algorithms with proven completeness. …”
Get full text
Get full text
Thesis -
8
Adaptive Algorithm for Optimal Route Configuration in Multi-Hop Wireless Sensor Network
Published 2017“…The obtained results show that the proposed algorithm provides an optimal route configuration with the best performance in terms of evaluating the covered distance, packet loss and time delay.…”
Get full text
Get full text
Get full text
Article -
9
An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network
Published 2019“…The element of Shortest Path First (SPF) Algorithm that is used in a routing protocol will be implemented. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Transmission path optimization Based on Efficiency Communication System
Published 2022“…At the same time, the developed algorithm combines the relative position of the cluster and the base station to further improve the routing method of the sub-cluster head, Finally, the algorithm analyzes the influence of different parameters on the transmission path, and use the simulation experiments to evaluate the conclusions.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…The multi-criterion energyefficient routing mechanism uses the ACO algorithm, inspired by ants' foraging behaviour. In Bluetooth M-LPNWSN systems, virtual ants explore paths based on signal robustness, distances, and energy consumption. …”
Get full text
Get full text
Get full text
Thesis -
12
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Nonlinear adaptive algorithm for active noise control with loudspeaker nonlinearity
Published 2014“…The proposed THF-NLFXLMS algorithm models the Wiener secondary path and applies the estimated degree of nonlinearity of the nonlinear secondary path in the control algorithm design. …”
Get full text
Get full text
Thesis -
14
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Dual Designated Path Routing Algorithm For Congestion Control In High-Density Network
Published 2021“…The OEG reactive routing algorithm is proposed to lessen the routing instabilities by reducing the control packets and promoting smoother packets flow through the traffic division into odd-path and even-path with the consideration of x and y-axis. …”
Get full text
Get full text
Get full text
Article -
16
Nonlinear THF-FXLMS algorithm for active noise control with loudspeaker nonlinearity
Published 2016“…The proposed THF-NLFXLMS algorithm, models the nonlinear secondary path and applies the estimated degree of nonlinearity in the control algorithm design. …”
Get full text
Get full text
Get full text
Article -
17
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
18
Accurate range free localization in multi-hop wireless sensor networks
Published 2019“…Simulation and experimental results show a substantial performance gain achieved by our proposed localization algorithm in wireless sensor networks. The performance is evaluated in terms of RMSE in terms of three algorithms WLS, CRLR, and GMSDP based on using the Monte Carlo simulation with account the number of anchors that varying from anchor=4 to anchor =20. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
20
Improving Network Consistency and Data Availability Using Fuzzy C Mean Clustering Algorithm in Wireless Sensor Networks
Published 2024thesis::doctoral thesis
