Search Results - (( based mac protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- protocol algorithm »
- implication based »
- java implication »
-
1
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…This research makes several significant contributions to the WSNs based on the IEEE 802.15.4 standards. First, the proposed incomplete cooperative game theoretic based MAC (GT-MAC) protocol, improves on the existing wireless sensor MAC protocols by offering significant network performance and lifetime extensions over the existing IEEE 802.15.4\Zigbee standards based WSN protocols. …”
Get full text
Get full text
Thesis -
2
Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol
Published 2009“…Sensor MAC as the very first MAC protocol for WSN has been designed on top of the IEEE 802.11 MAC protocol along with some added features to meet the special requirements of a WSN. …”
Get full text
Get full text
Thesis -
3
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
Published 2013“…One of the major protocols of our interest is MAC protocol. Different contention-based MAC Protocols for Wireless Sensor Networks (WSNs) have been proposed over the last few years. …”
Get full text
Get full text
Thesis -
4
Medium access control protocol based on time division multiple access scheme for wireless body area network
Published 2024“…The proposed protocol is compared to the IEEE 802.15.6 MAC, enhanced packet scheduling algorithm MAC (EPSA-MAC), and concurrent MAC (C-MAC) protocols based on the performance metrics of packet delivery ratio (PDR), network throughput, energy consumption, and average delay. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Adaptive medium access control protocol for dynamic medical traffic with quality of service provisioning in wireless body area network
Published 2024“…The proposed ADT-MAC protocol is simulated using Castalia and OMNeT++ to evaluate its performance against state-of-the-art MAC protocols. …”
Get full text
Get full text
Get full text
Article -
6
Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal
Published 2020“…In this thesis, a new approach called enhanced cluster-based TDMA MAC (EC-TMAC) protocol was developed to address these challenges. …”
Get full text
Get full text
Get full text
Thesis -
7
Adaptive Medium Access Control (ADT-MAC) Protocol for Dynamic Medical Traffic with Quality of Service (QoS) provisioning in Wireless Body Area Network (WBAN)
Published 2025“…The proposed ADT-MAC protocol is simulated using Castalia in OMNeT++ to evaluate its performance against state-of-the-art MAC protocols. …”
Get full text
Get full text
Thesis -
8
-
9
Cohesive token passing algorithm utilizing software agents
Published 2010“…MAC protocols have been extensively researched from several angles. …”
Get full text
Get full text
Article -
10
Computational model for energy aware TDMA-based MAC protocol for wireless sensor network system
Published 2007Get full text
Get full text
Conference or Workshop Item -
11
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Some of these challenges result from the transmission of huge amounts of data in each data sensing period and the complexity of SHM algorithms. Furthermore, in WSNs, the operating system (OS) with its network protocol stack and media access control (MAC) layer protocol play an essential role in managing the scarce resources, data processing and communication. …”
Get full text
Get full text
Thesis -
12
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. …”
Get full text
Get full text
Get full text
Article -
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Adaptive data collection algorithm for wireless sensor networks
Published 2008Get full text
Get full text
Article -
15
Encryption selection for WLAN IEEE802.11G
Published 2013“…The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. …”
Get full text
Get full text
Thesis -
16
Embedded Ethernet System For Real-Time Communication
Published 2018“…Moreover, a backoff algorithm is the part of MAC protocol which implements for rescheduling the transmission of a packet after a collision occurs. …”
Get full text
Get full text
Monograph -
17
An efficient backoff algorithm for IEEE 802.15.4 wireless sensor networks
Published 2014“…In this paper, we propose an efficient backoff algorithm, called EBA-15.4MAC that enhances the performance of slotted CSMA/CA algorithm. …”
Get full text
Get full text
Article -
18
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the current sequential algorithm. …”
Get full text
Get full text
Thesis -
19
Efficient back-off mechanism for IEEE802.15.4 wireless sensor networks
Published 2015“…In this book, we propose an efficient backoff algorithm, called EBA-15.4MAC that enhances the performance of slotted CSMA/CA algorithm. …”
Get full text
Get full text
Book -
20
Grouping based radio frequency identification anti-collision protocols for dense internet of things application
Published 2022“…Hence, the need to enhance existing dynamic frame slotted ALOHA (DFSA) based electronic product code (EPC) C1G2 media access control (MAC) protocol. …”
Get full text
Get full text
Article
