Performance study of Byzantine Agreement Protocol with artificial neural network
nce 1982, numerous Byzantine Agreement Protocols (BAPs) have been developed to solve arbitrary faults in the Byzantine Generals Problem (BGP). A novel BAP, using an artificial neural network (ANN), was proposed by Wang and Kao. It requires message exchange rounds similar to the traditional BAP and i...
| Main Authors: | Lee, Kok-Wah, Ewe, Hong-Tat |
|---|---|
| Format: | Article |
| Published: |
ELSEVIER SCIENCE INC
2007
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2990/ |
Similar Items
Artificial Neural Network Based Byzantine Agreement Protocol
by: Lee, Kok Wah
Published: (2002)
by: Lee, Kok Wah
Published: (2002)
Artificial Neural Network Based Byzantine Agreement Protocol
by: Lee, Kok Wah
Published: (2002)
by: Lee, Kok Wah
Published: (2002)
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006)
by: Lee, Kok-wah, et al.
Published: (2006)
Passphrase with semantic noises and a proof on its higher information rate
by: Lee, Kok-Wah, et al.
Published: (2007)
by: Lee, Kok-Wah, et al.
Published: (2007)
Multiple hashes of single key with passcode for multiple accounts
by: Lee, Kok-wah, et al.
Published: (2007)
by: Lee, Kok-wah, et al.
Published: (2007)
CSC513 – ARTIFICIAL NEURAL NETWORKS - OKT. 2000
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2000)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2000)
CCS501 – NEURAL NETWORKS AND GENETIC ALGORITHMS
CSC513 – ARTIFICIAL NEURAL NETWORKS - SEPT. 2001
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
Energy efficient routing for wireless sensor networks with grid topology
by: Goh, Hock Guan, et al.
Published: (2006)
by: Goh, Hock Guan, et al.
Published: (2006)
The Effect Of Using XCAST Based Routing Protocol in Wireless Ad Hoc Networks.
by: Alzyoud, Faisal Y., et al.
Published: (2009)
by: Alzyoud, Faisal Y., et al.
Published: (2009)
Robust routing table design for IPv6 lookup
by: Yong, S. M., et al.
Published: (2005)
by: Yong, S. M., et al.
Published: (2005)
A model for secure knowledge sharing
by: Ismail Ahmad,, et al.
Published: (2005)
by: Ismail Ahmad,, et al.
Published: (2005)
Hybridization Of Optimized Support
Vector Machine And Artificial Neural
Network For The Diabetic Retinopathy
Classification Problem
by: Kader, Nur Izzati Ab
Published: (2019)
by: Kader, Nur Izzati Ab
Published: (2019)
CSC513- ARTIFICIAL NEURAL NETWOKS SEP 99.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
IPv6 packet classification based on flow label, source and destination addresses
by: Poh, Eric C. K., et al.
Published: (2005)
by: Poh, Eric C. K., et al.
Published: (2005)
Approximate Entropy-Based Epileptic EEG Detection Using Artificial Neural Networks
by: Srinivasan, Vairavan, et al.
Published: (2007)
by: Srinivasan, Vairavan, et al.
Published: (2007)
Automated Detection of Anesthetic Depth Levels Using Chaotic Features with Artificial Neural Networks
by: Lalitha, V., et al.
Published: (2007)
by: Lalitha, V., et al.
Published: (2007)
PERFORMANCE EVALUATION OF SINGLE-PATH AND MULTIPATH MANETS ROUTING PROTOCOLS FOR DENSE AND SPARSE TOPOLOGY
by: Mahdi, Mohammed A., et al.
Published: (2017)
by: Mahdi, Mohammed A., et al.
Published: (2017)
Prototyping of Wavelet Transform, Artificial Neural Network and Fuzzy Logic for Power Quality Disturbance Classifier
by: Reaz, M. B. I., et al.
Published: (2007)
by: Reaz, M. B. I., et al.
Published: (2007)
Stock Trend Prediction With Neural Network Techniques
by: Mohd Haris Lye Abdullah,
Published: (2003)
by: Mohd Haris Lye Abdullah,
Published: (2003)
Dynamic tunneling based regularization in feedforward neural networks
by: Singh, Y.P., et al.
Published: (2001)
by: Singh, Y.P., et al.
Published: (2001)
CST337 – Network Configurations And Protocols
(Konfigurasi Dan Protokol Rangkaian)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
CST337 – Network configuration and protocols (Konfigurasi dan protokol rangkaian)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
Performance of an ant colony optimization (ACO) algorithm on the dynamic load-balanced clustering problem in ad hoc networks
by: Ho, , CK, et al.
Published: (2005)
by: Ho, , CK, et al.
Published: (2005)
VHDL Modeling for Classification of Power Quality Disturbance Employing Wavelet Transform, Artificial Neural Network and Fuzzy Logic
by: Reaz, M.B.I., et al.
Published: (2006)
by: Reaz, M.B.I., et al.
Published: (2006)
Observing the Evolution of Neural Networks Learning to Play the Game of Othello
by: Chong, S.Y., et al.
Published: (2005)
by: Chong, S.Y., et al.
Published: (2005)
Neural network classification of late gamma band electroencephalogram features
by: Ravi, K. V. R., et al.
Published: (2006)
by: Ravi, K. V. R., et al.
Published: (2006)
CCS 501 - NEURAL NETWORKS AND GENETIC ALGORITHMS - OKT. 2004
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
CCS501 - NEURAL NETWORKS AND GENETIC ALGORITHMS - OKT. 2004
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
Enhancing The Quality Of Service In Mobile Networks Based On Nemo Basic Support Protocol
by: Alshaibani, Badiea Abdulkarem Mohammed
Published: (2018)
by: Alshaibani, Badiea Abdulkarem Mohammed
Published: (2018)
Autonomous and deterministic probabilistic neural network using global k-means
by: Chang, Roy Kwang Yang, et al.
Published: (2006)
by: Chang, Roy Kwang Yang, et al.
Published: (2006)
A prediction-based neural network scheme for lossless data compression
by: Logeswaran, R.
Published: (2002)
by: Logeswaran, R.
Published: (2002)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Slow Fusion Triplanar Convolutional Neural Networks For Liver Tumor Segmentation
by: Chung, Sheng Hung
Published: (2022)
by: Chung, Sheng Hung
Published: (2022)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
by: Al-Zyoud, Faisal Yousef Abed-alrahman
Published: (2011)
by: Al-Zyoud, Faisal Yousef Abed-alrahman
Published: (2011)
Hybrid Mac Protocol With Intra- Cluster Communications For Extending Wireless Sensor Network Lifetimes
by: Elsmany, Eyman Fathelrhman Ahmed
Published: (2019)
by: Elsmany, Eyman Fathelrhman Ahmed
Published: (2019)
Ant Colony Optimization Approaches for the Dynamic Load-Balanced Clustering Problem in Ad Hoc Networks
by: Ho, Chin K., et al.
Published: (2007)
by: Ho, Chin K., et al.
Published: (2007)
Adaptive and fuzzy approaches for nodes affinity management in wireless ad-hoc networks
by: Natsheh, Essam, et al.
Published: (2008)
by: Natsheh, Essam, et al.
Published: (2008)
A Short Review Of Neural Network Techniques In Visual Servoing Of Robotic Manipulators.
by: Ramachandram, Dhanesh, et al.
Published: (2003)
by: Ramachandram, Dhanesh, et al.
Published: (2003)
Similar Items
-
Artificial Neural Network Based Byzantine Agreement Protocol
by: Lee, Kok Wah
Published: (2002) -
Artificial Neural Network Based Byzantine Agreement Protocol
by: Lee, Kok Wah
Published: (2002) -
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006) -
Passphrase with semantic noises and a proof on its higher information rate
by: Lee, Kok-Wah, et al.
Published: (2007) -
Multiple hashes of single key with passcode for multiple accounts
by: Lee, Kok-wah, et al.
Published: (2007)