Search Results - (( based applications protocol algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study by Hassan, Ali Abdul Hussian, Md Shah, Wahidah, Jabbar Mohammed, Ali Abdul, Othman, Mohd Fairuz Iskandar

    Published 2017
    “…In this paper, numerous energy efficient routing algorithms for hierarchical routing protocol in Wireless Sensor Networks have been discussed based on the clustering approaches. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…The evaluation results have recorded an improvement in conservation of energy, of almost 50% less consumed energy even with an increase in the number of nodes, by comparing with an existing routing technique based on ant system, a current routing protocol for IoT and the conventional ACO algorithm. © 2020 ASTES Publishers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    On the security of digital signature protocol based on iterated function systems. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2011
    “…Hash functions are used within digital signature schemes to provide data integrity for cryptographic applications. In this paper, we take a closer look at the security and efficiency of the digital signature protocol based on fractal maps. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…The core of the new protocol is based on the circulation mechanism of the token. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization by Mutiara, Giva Andriana

    Published 2022
    “…Based on the testing result, the FSM-GEAR protocol minimized the energy consumption by about 12.5% than the M-GEAR protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Energy-efficient scalable routing protocol based on ACO for WSNS by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2019
    “…To overcome the existing problem of accommodating node mobility, reducing initialization time for ant based routing algorithm and to maintain scalability in WSN for time critical applications, an ACO based WSN routing algorithm has been proposed and analyzed in this paper. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20