Search Results - (( based modeling protocol algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- protocol algorithm »
- modeling protocol »
- java implication »
- implication tree »
- based modeling »
- tree algorithm »
-
1
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…By applying the proposed algorithm, the throughput of EDCA protocol was increased by 42.9% and it can support 14 voice users rather than 11 in the default EDCA protocol. …”
Get full text
Get full text
Get full text
Thesis -
2
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
3
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
4
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…Thus, the LDPC code encoder model is developed to identify a low complexity encoding algorithm of LDPC code for the DF protocol relay system. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…To validate the proposed ECG-based authentication protocol model, the FAR and FRR analysis is done and then followed by the complexity analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization
Published 2022“…The research objective is to have a low-power consumption protocol applied in a model network based on the actual environment suitable for illegal logging characteristics. …”
Get full text
Get full text
Get full text
Thesis -
8
A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks
Published 2019“…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
Get full text
Get full text
Thesis -
9
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
10
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
11
Cohesive token passing algorithm utilizing software agents
Published 2010“…The core of the new protocol is based on the circulation mechanism of the token. …”
Get full text
Get full text
Article -
12
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…For EL video packets, an enhanced routing algorithm was proposed to route the Enhance Layer (EL) packets, namely, Energy Sensible and Route Stability Based Routing Protocol (ESRSBRP) which is used over Mobile network. …”
Get full text
Get full text
Get full text
Thesis -
13
A design of redirect link failure protocol based on dynamic source routing for mobile ad hoc networks
Published 2011“…If an alternative route is not available, the source node will reinitiate route discovery process to find a new route, which may result in the decrease of the performance of DSR protocol. Therefore, to avoid this situation, we propose an extension of DSR protocol called Redirect Link Failure Protocol (RLFP) in order to solve link failure problem and update routes in the route cache of DSR protocol.RLFP consists of three parts.The first part is based on Link Prediction Algorithm, which utilises signal power strength from the received packets to predict the link before any break down happens.The second part is based on Link Solution Model, which contains sub-models that can solve and redirect link failure.Finally, the Enhanced Route Cache Model, which possesses a scheme that is called “Updating Route Scheme”, to avoid stale routes.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
14
Routine insulin sliding scale protocol versus software driven algorithm (star protocol) for blood glucose management of critically ill patients in the ICU: A prospective observatio...
Published 2018“…However, the incidence of severe hypoglycaemic events (BG < 2.2 mmol/L) was 0.05% using the ISS arm whereas there was no incidence of hypoglycaemia in the STAR protocol arm. Despite both arms showing similar performance in terms of BG therapy, there is still much room for improvement with the STAR protocol as simulations were made based on Caucasian population pharmacokinetic and pharmacodynamics models. …”
Get full text
Get full text
Thesis -
15
Computational model for energy aware TDMA-based MAC protocol for wireless sensor network system
Published 2007Get full text
Get full text
Conference or Workshop Item -
16
Improvement of routing protocol in wireless sensor network for energy consumption to maximize network lifetime
Published 2013“…This document is a study about hierarchical cluster-based routing protocol algorithm where the implementation was done using Matlab simulator to study the performance of this algorithm in term of lifetime. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…In this paper, we present an Authentication-Chains protocol which is a lightweight decentralized protocol for IoT authentication based on blockchain distributed ledger. …”
Get full text
Get full text
Article -
18
Embedded Ethernet System For Real-Time Communication
Published 2018“…Based on the simulation, EIED backoff algorithm gave better performance in term of average delay compare to other algorithms. …”
Get full text
Get full text
Monograph -
19
A conceptual automated negotiation model for decision making in the construction domain
Published 2023Conference Paper -
20
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…This research makes several significant contributions to the WSNs based on the IEEE 802.15.4 standards. First, the proposed incomplete cooperative game theoretic based MAC (GT-MAC) protocol, improves on the existing wireless sensor MAC protocols by offering significant network performance and lifetime extensions over the existing IEEE 802.15.4\Zigbee standards based WSN protocols. …”
Get full text
Get full text
Thesis
