Search Results - (( based applications protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- applications protocol »
- based applications »
- protocol algorithm »
- implication based »
- java implication »
-
1
New algorithms to minimize handoff latency in AMTree protocol
Published 2009Get full text
Get full text
Get full text
Article -
2
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017Get full text
Get full text
Monograph -
3
-
4
Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study
Published 2017“…In this paper, numerous energy efficient routing algorithms for hierarchical routing protocol in Wireless Sensor Networks have been discussed based on the clustering approaches. …”
Get full text
Get full text
Get full text
Article -
5
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
6
-
7
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…The evaluation results have recorded an improvement in conservation of energy, of almost 50% less consumed energy even with an increase in the number of nodes, by comparing with an existing routing technique based on ant system, a current routing protocol for IoT and the conventional ACO algorithm. © 2020 ASTES Publishers. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
9
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
On the security of digital signature protocol based on iterated function systems.
Published 2011“…Hash functions are used within digital signature schemes to provide data integrity for cryptographic applications. In this paper, we take a closer look at the security and efficiency of the digital signature protocol based on fractal maps. …”
Get full text
Get full text
Get full text
Article -
12
Cohesive token passing algorithm utilizing software agents
Published 2010“…The core of the new protocol is based on the circulation mechanism of the token. …”
Get full text
Get full text
Article -
13
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014Get full text
Get full text
Final Year Project -
14
FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization
Published 2022“…Based on the testing result, the FSM-GEAR protocol minimized the energy consumption by about 12.5% than the M-GEAR protocol. …”
Get full text
Get full text
Get full text
Thesis -
15
Energy-efficient scalable routing protocol based on ACO for WSNS
Published 2019“…To overcome the existing problem of accommodating node mobility, reducing initialization time for ant based routing algorithm and to maintain scalability in WSN for time critical applications, an ACO based WSN routing algorithm has been proposed and analyzed in this paper. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
-
18
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014Get full text
Get full text
Final Year Project -
19
-
20
