Search Results - (( based content sensor algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2

    Smart geographical routing protocol achieving high QoS and energy efficiency based for wireless multimedia sensor networks by Hussein, Wael Ali, Mohd Ali, Borhanuddin, A. Rasid, Mohd Fadlee, Hashim, Fazirulhisyam

    Published 2021
    “…In this paper, we present a routing algorithm that provides a low end-to-end packet delay and low packet loss, referred to as smart, greedy forwarding algorithm based on throughput and energy-awareness (SGFTEM). …”
    Get full text
    Get full text
    Article
  3. 3

    An efficient CSMA-CA algorithm for IEEE 802.15.4 wireless sensor networks by Dahham, Zahraa, Sali, Aduwati, Mohd Ali, Borhanuddin, Jahan, Md. Saukat

    Published 2012
    “…CAP utilizes Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA) algorithm for its contention mechanism and channel access. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Disposable Biomimetic Array Sensor Strip Coupled With Chemometric Algorithm For Quality Assessment Of Orthosiphon Stamineus Benth Samples by Yap, Maxsim Mee Sim

    Published 2006
    “…A disposable screen printed array sensor strip based on self-plasticized methacrylate acrylate PVC blend lipid membranes combined with chemometric algorithm has been developed and applied for qualitative and quantitative analysis of O.stamineus samples. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol by Pirborj, Nesae Mouzehkesh

    Published 2009
    “…However the Back-Off scheme of Sensor MAC (S-MAC) is based on a fixed Contention Window (CW) size. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks by Qadawi, Zahraa D.A.

    Published 2013
    “…Different contention-based MAC Protocols for Wireless Sensor Networks (WSNs) have been proposed over the last few years. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Self-Schedule and Self-Distributive MAC Scheduling Algorithms for Next-Generation Sensor Networks by Bakhsh, S.T., Aman Sheikh, M., Alghamdi, R.

    Published 2015
    “…It has been demonstrated that, with regard to communication overhead, energy consumption and execution time through simulation proposed that algorithms outperform existing distributed randomized scheduling algorithm (DRAND). …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network by Jahan, Mohammad Saukat

    Published 2015
    “…This research makes several significant contributions to the WSNs based on the IEEE 802.15.4 standards. First, the proposed incomplete cooperative game theoretic based MAC (GT-MAC) protocol, improves on the existing wireless sensor MAC protocols by offering significant network performance and lifetime extensions over the existing IEEE 802.15.4\Zigbee standards based WSN protocols. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Method of Moment Analysis Using Open-Ended Coaxial Sensor in Determination of Corn Reflection Coefficient by Soleimani, Hojjatollah

    Published 2010
    “…A calibration equation has been developed based on the relationship between the measured moisture content obtained by the oven drying method and the phase of the reflection coefficient of the sensor. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15

    Simultaneous measurement of multiple soil properties through proximal sensor data fusion: a case study by Wenjun, Ji, Adamchuk, Viacheslav I., Song, Chao Chen, Mat Su, Ahmad S., Ismail, Ashraf, Qianjun, Gan, Zhou, Shi, Biswas, Asim

    Published 2019
    “…Improved predictions were observed for most soil properties based on sensor data fusion than those based on individual sensors. …”
    Get full text
    Get full text
    Article
  16. 16

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  17. 17

    QoS BASED ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORK by NAZIR, BABAR

    Published 2012
    “…Clustering within normal sensor nodes is done by optimizing the network/coverage lifetime through a cluster-head-selection algorithm and a sleep/wake scheduling algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Detection of low metal landmines using EMI by Azman, Amzarul Faris, Abdul Rahim, Ruzairi, Abdul Rahim, Herlina, Yunus, Yusri, Ahmad, Anita, Md. Yunus, Mohd Amri, Wahid, Herman

    Published 2016
    “…Unfortunately, there is often a significant amount of metallic debris (clutter) present in the environment. Consequently, EMI sensors that utilize traditional detection algorithms based solely on the metal content suffer from high false alarm rates. …”
    Get full text
    Get full text
    Book Section