Search Results - (( data distribution sensor algorithm ) OR ( data distribution rate algorithm ))

Refine Results
  1. 1

    An Improved Distributed Scheduling Algorithm for Wireless Sensor Networks by Sheikh, Muhammad Aman, Drieberg , Micheal, Zain Ali, Noohul Basheer

    Published 2012
    “…The emergence of high data rate, low power consumption and small size sensor network applications, has increased the demand for high-performance network services. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network by Hindia, M.N., Reza, A.W., Noordin, K.A.

    Published 2015
    “…On the first level, bankruptcy and shapely value algorithm fairly distribute the resources among smart grid applications. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  5. 5

    Efficient energy utilization through optimum number of sensor node distribution in engineered corona-based (ONSD-EC) wireless sensor network by Rahman, A.U., Hasbullah, H., Sama, N.U.

    Published 2013
    “…An algorithm is proposed to distribute the optimum number of sensor nodes in corona-based networks. …”
    Get full text
    Get full text
    Article
  6. 6

    Efficient energy utilization through optimum number of sensor node distribution in engineered corona-based (ONSD-EC) wireless sensor network by Rahman, A.U., Hasbullah, H., Sama, N.U.

    Published 2013
    “…An algorithm is proposed to distribute the optimum number of sensor nodes in corona-based networks. …”
    Get full text
    Get full text
    Article
  7. 7

    Efficient energy utilization through optimum number of sensor node distribution in engineered corona-based (ONSD-EC) wireless sensor network by Rahman, A.U., Hasbullah, H., Sama, N.U.

    Published 2013
    “…An algorithm is proposed to distribute the optimum number of sensor nodes in corona-based networks. …”
    Get full text
    Get full text
    Article
  8. 8

    Efficient energy utilization through optimum number of sensor node distribution in engineered corona-based (ONSD-EC) wireless sensor network by Rahman, A.U., Hasbullah, H., Sama, N.U.

    Published 2013
    “…An algorithm is proposed to distribute the optimum number of sensor nodes in corona-based networks. …”
    Get full text
    Get full text
    Article
  9. 9

    Efficient energy utilization through optimum number of sensor node distribution in engineered corona-based (ONSD-EC) wireless sensor network by Rahman, A.U., Hasbullah, H., Sama, N.U.

    Published 2013
    “…An algorithm is proposed to distribute the optimum number of sensor nodes in corona-based networks. …”
    Get full text
    Get full text
    Article
  10. 10

    Development of a wireless mesh network routing algorithm for oil and gas pipeline networks by Azman, Amierul Syazrul Azril

    Published 2021
    “…A larger amount of data are generated into the traffic as more number of sensor nodes introduced in the network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    MMS : mobile monitoring system using electrical capacitance tomography (ECT) by Abdul Rahim, Ruzairi, Chan, Kok Seong

    Published 2008
    “…In this case, a high speed data processing rate data acquisition system and a high speed data reconstruction and image display system have been developed. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Coordinate-Descent Adaptation over Hamiltonian Multi-Agent Networks by Azam Khalili, Vahid Vahidpour, Amir Rastegarnia, Ali Farzamnia, Teo, Kenneth Tze Kin, Saeid Sanei

    Published 2021
    “…We draw a comparison between the proposed coordinate-descent incremental LMS (CD-ILMS) algorithm and the ILMS algorithm in terms of convergence rate and computational complexity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors which produces a measurable response to a change in a physical or chemical condition, e.g. temperature and ground composition. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…By this means sensor nodes transmit the data either to next hop neighbors or directly to the sink node. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications by Rafique, Majid

    Published 2025
    “…By using a task scheduling and offloading method, the FOCS algorithm arranges data according to size and sends it to the appropriate fog nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model by Jasim, Ahmed Abdulhadi, Idris, Mohd Yamani Idna, Azzuhri, Saaidal Razalli, Issa, Noor Riyadh, Noor, Noorzaily Mohamed, Kakarla, Jagadeesh, Amiri, Iraj Sadegh

    Published 2019
    “…Wireless sensor networks (WSNs) consist of a large number of sensor nodes that are distributed to capture the information about an area of interest. …”
    Get full text
    Get full text
    Article
  17. 17

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
    Get full text
    Get full text
    Thesis
  18. 18

    FuMAM: fuzzy-based mobile agent migration approach for data gathering in wireless sensor networks by Qadori, Huthiafa Q., Ahmad Zukarnain, Zuriati, Mohd Hanapi, Zurina, Subramaniam, Shamala

    Published 2018
    “…Moreover, the proposed FuMAM approach outperforms the compared algorithms in terms of energy distribution usage among nodes.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    EFFICIENT DYNAMIC ADDRESSING BASED ROUTING FOR UNDERWATER WIRELESS SENSOR NETWORKS by ARSHAD, MUHAMMAD AYAZ ARSHAD

    Published 2011
    “…Besides long propagation delays and high error probability, continuous node movement also makes it difficult to manage the routing information during the process of data forwarding. In order to overcome the problem of large propagation delays and unreliable link quality, many algorithms have been proposed and some of them provide good solutions for these issues, yet continuous node movements still need attention. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed,, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. …”
    Get full text
    Get full text
    Get full text
    Article