Search Results - (( based testing protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- protocol algorithm »
- implication based »
- testing protocol »
- java implication »
- based testing »
-
1
Encryption selection for WLAN IEEE802.11G
Published 2013“…There were two scenarios that have been tested in the simulation. In the first scenario, the data was tested with encryption protocols and for the second scenario, the data was tested with encryption algorithms and also encryption protocols. …”
Get full text
Get full text
Thesis -
2
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017“…Thus, smart protocol algorithm is developed to replace the previous system. …”
Get full text
Get full text
Monograph -
3
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization
Published 2022“…Based on the testing result, the FSM-GEAR protocol minimized the energy consumption by about 12.5% than the M-GEAR protocol. …”
Get full text
Get full text
Get full text
Thesis -
6
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
7
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
8
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…The proposed protocol security performance is analyzed using cryptographic protocols verifier software and tested. …”
Get full text
Get full text
Article -
9
Optimal forwarding routing protocol in ipv6-based wireless sensor network
Published 2009“…Here, actual performance of OF routing protocol is evaluated and compared with Greedy Forwarding and RIP routing protocol in WSN test bed. …”
Get full text
Get full text
Thesis -
10
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
11
A new particle swarm optimization for wireless mesh routing protocol
Published 2008“…Based on the results, we proven that PSO-SIIW algorithm can be applied to MPR calculation in OLSR.…”
Get full text
Monograph -
12
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…To validate the proposed ECG-based authentication protocol model, the FAR and FRR analysis is done and then followed by the complexity analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
14
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
15
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
16
Personalized administration of contrast medium with high delivery rate in low tube voltage coronary computed tomography angiography
Published 2019“…The algorithm was retrospectively tested in 45 patients who underwent retrospectively ECG-gated CCTA with a 100 kVp protocol. …”
Get full text
Get full text
Article -
17
Effective routing protocol for wireless sensor networks using CRT-leach algorithm / Kamaldeen Ayodele Raji, Ayisat Wuraola Asaju-Gbolagade and Kazeem Alagbe Gbolagade
Published 2021“…Chinese Remainder Theorem (CRT)- based packet splitting integrated with Low-Energy Adaptive Clustering Hierarchy (LEACH) algorithm routing protocol was proposed so as to decrease vitality utilization during correspondence and improve message dependability in WSNs. …”
Get full text
Get full text
Get full text
Article -
18
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
19
Reliable low power network protocol in IoT for agriculture field
Published 2024“…The data link layer protocol handles the Medium Access Control (MAC) of the mesh network efficiently using algorithms based on the Scheduling sub-cycle of the Fast, Adaptive, and Energy-efficient Multi-channel-multi-path (FAEM) protocol by Liew et al. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap
Published 2014“…This paper mainly evaluates three kinds of UDP-based high speed transport protocols (RUBDP, UDT, and PA-UDP). …”
Get full text
Get full text
Thesis
