Search Results - (( data construction protocol algorithm ) OR ( java implication _ algorithm ))
Search alternatives:
- construction protocol »
- protocol algorithm »
- data construction »
- java implication »
-
1
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
Get full text
Get full text
Thesis -
2
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…However, in a larger system such as Data Grid, the existing replica control protocols require bigger number of replicas to construct read and write quorums. …”
Get full text
Get full text
Thesis -
3
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. Secured communication is achieved where the notion of plausible deniability is successfully implemented by fusing the processes of theorem's verification and data's validation in the protocol construction methodology.…”
Get full text
Get full text
Thesis -
4
QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol
Published 2006“…This article describes the study of improving the proposed protocol called Receiverinitiated WDM Tree Construction (R-IWDMTC) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
5
Development of wireless data acquisiton system using LoRa technology for construction of PID control system
Published 2025text::Thesis -
6
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…EBCRA solves the issue of redundant re-transmission of RREQ packet and propose a routing algorithm that deal with the broadcast storm problem which is widely practiced in MANET routing protocol. …”
Get full text
Get full text
Get full text
Thesis -
7
Strategies for effective value management practice in construction industry
Published 2017“…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
9
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
Published 2014“…The IEEE 802.15.4 standard includes the required protocols to construct a WSN. The security protocols of the IEEE 802.15.4 support the protection for the WSN; however, the implement of security protocols degrades the performance of the WSN. …”
Get full text
Get full text
Thesis -
10
Smart site monitoring system / Muhammad Azmi and Muhammad Naim Mahyuddin
Published 2023“…Advanced data analytics and machine learning algorithms process this data, enabling the system to detect potential safety hazards, monitor construction progress, and predict resource requirements. …”
Get full text
Get full text
Conference or Workshop Item -
11
Hypertension Among Dental Patients: A Single Institution Experience And Development Of A Working Clinical Algorithm For Dental Practitioners
Published 2026journal::journal article -
12
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
Get full text
Get full text
Thesis -
13
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
Published 2012“…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
Get full text
Get full text
Thesis -
14
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009“…In addition, at the end we will give some future directions, which can be helpful in order to construct the algorithms for such environments.…”
Get full text
Get full text
Conference or Workshop Item -
15
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009“…In addition, at the end we will give some future directions, which can be helpful in order to construct the algorithms for such environments.…”
Get full text
Get full text
Conference or Workshop Item -
16
A reliable unicast routing protocol for mobile ad hoc network
Published 2013“…A route is constructed and represented by a sequence of clusters and more reliable links are selected for data transfer inside and between the clusters. …”
Get full text
Get full text
Thesis -
17
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…To show the benefit of the ENP protocol, it has been utilized as the neighbor protocol with the CDS and both are integrated into AODV routing protocol. …”
Get full text
Get full text
Get full text
Thesis -
18
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
text::Thesis -
19
Differential evolution optimization for constrained routing in Wireless Mesh Networks
Published 2014“…Simulation on NS2 proves its performance advantages over AODV protocol.…”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Energy-efficient medium access control strategy for cooperative wireless networks
Published 2016“…The proposed protocol decides between energy harvesting, data transmission and relaying transmission. …”
Get full text
Get full text
Thesis
