Search Results - (( data distribution from algorithm ) OR ( data distribution path algorithm ))

Refine Results
  1. 1

    Performance analysis of ZigBeePRO network using shortest path algorithm for Distributed Renewable Generation by Islam, Syed Zahurul, Othman, Mohammad Lutfi, Islam, Syed Zahidul

    Published 2021
    “…In this paper, we have analysed the performance of the ZigBeePRO network by applying the shortest path algorithm while delivering energy data from the solar DRG to the SG. …”
    Get full text
    Get full text
    Article
  2. 2

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…In dealing with traffic routing problem, two algorithms, Dijkstra's Shortest Path and Genetic Algorithm (GA) are combined together and enhanced to re-strategize a better routing mechanism for a heterogeneous mix of traffic classes ranging from traditional voice calls to multimedia data services in Low Earth Orbit (LEO) satellite networks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN by Ibrahim, Nurul Saliha Amani

    Published 2022
    “…Due to finite resource, multiple issues need to be considered in designing such system, including AG flight time, coverage radius and the achievable data rate of the ground-to-air system, thus an Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Solving A Fuel Distribution Problem Using Genetic Algorithm: A Traveling Salesman Problem Approach by Abd Rahman, Rosshairy, Mokhtar, Nurul Ezatty, Bahrom, Ummu Latifah

    Published 2017
    “…The shortest distance was attained using Genetic Algorithm (GA) technique. The solution obtained from GA was then compared with Hill Climbing technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network by Wan Isni Sofiah, Wan Din, Asyran Zarizi, Abdullah, Razulaimi, Razali, Ahmad Firdaus, Zainal Abidin, Salwana, Mohamad, Eh Phon, Danakorn Nincarean, Cik Feresa, Mohd Foozy

    Published 2019
    “…Currently, the data transmission from sensor nodes to the cluster head uses a single hop which consumes more energy; thus, in this paper the enhancement of previous algorithm, which is MAP, the data transmission will use several paths to reach the cluster head. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network by Ahmed Al-Doori, Ahmed Jamal

    Published 2018
    “…The protocol compares the power available on all the paths from source to sink and then selects the path with highest power. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Ant system with heuristics for capacitated vehicle routing problem by Tan, Wen Fang

    Published 2013
    “…It is a basic production and distribution management problem which is of economic importance to business because of time and costs contributed by the delivery of the products from the depot to the customers. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2025
    “…This paper provides an overview of localization algorithms, including centralized and distributed algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Accurate range free localization in multi-hop wireless sensor networks by Abdulwahhab, Abdullah Raed

    Published 2019
    “…In addition, energy-based informant localization approaches are generally established corresponding to the channel path-loss models in which the noise is mostly expected to shadow Gaussian distributions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…The RRSEB operations focus on enhancement of the path recovery process, this is done by introducing proactively route mechanism to create alternative paths together with the data routing obtained by path discovery stage in order to reduce the packet drops. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Estimation of transformers health index based on condition parameter factor and hidden Markov model by Mohd Selva, Amran, Yahaya, Muhammad Sharil, Azis, Norhafiz, Ab Kadir, Mohd Zainal Abidin, Jasni, Jasronita, Yang Ghazali, Young Zaidey

    Published 2018
    “…Subsequently, the future states probability distribution was computed based on the HMM prediction model and viterbi algorithm was applied to find the best optimal path sequence of HI for the respective observable condition. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    A Study of Visual Attention in Diagnosing Cerebellar Tumours by Kuryati, Kipli, Kasumawati, Lias, Dayang Azra, Awang Mat, Othman, A.K., Ade Syaheda Wani, Marzuki, Zamhari, N.

    Published 2009
    “…The status of each MRS is verified by using decision algorithm. Analysis involves determination of humans’s eye movement pattern in measuring the peak of spectrograms, scan path and determining the relationship of distributions of fixation durations with the accuracy of measurement. …”
    Get full text
    Get full text
    Article
  19. 19

    Hybrid LTE-VANETs Based Optimal Radio Access Selection by Ayoob, Ayoob A., Su, Gang, Wang, Desheng, Mohammed, Muamer N., Hammood, Omar A.

    Published 2018
    “…This paper proposed an ancient hybrid optimal radio access selection algorithm (ORAS) which combines the LTE and VANET networks with accomplishing high data packet delivery ratios and low delay, while maintaining the minimum level of cellular infrastructure usage by means of increasing the stability of link transmission and reducing the number of hopes per route. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  20. 20

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…Bio-inspired mechanisms are shown to be adaptive to environmental variations, robust and scalable, and require less computational and energy resources for designing secure routing algorithms for distributed optimization. In IoT network, the malicious intruders can exploit the routing system of the standardized routing protocol, e.g., RPL (The Routing Protocol for Low-Power and Lossy Networks), that does not observe the node’s routing behavior prior to data forwarding, and can launch various forms of routing attacks. …”
    Get full text
    Get full text
    Get full text
    Article