Search Results - (( developing construction protocol algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- construction protocol »
- application matching »
- protocol algorithm »
- java application »
-
1
-
2
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…The first step of the proposed protocol involves the development of an energy efficient clustering algorithm which is appropriate for WSN with a sparse density topology. …”
Get full text
Get full text
Thesis -
3
QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol
Published 2006“…This article describes the study of improving the proposed protocol called Receiverinitiated WDM Tree Construction (R-IWDMTC) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
4
Strategies for effective value management practice in construction industry
Published 2017“…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Development of wireless data acquisiton system using LoRa technology for construction of PID control system
Published 2025text::Thesis -
6
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
Published 2014“…The Wireless Sensor Network (WSN) is defined to connect the sensors by using a set of protocols. The IEEE 802.15.4 standard includes the required protocols to construct a WSN. …”
Get full text
Get full text
Thesis -
7
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
8
-
9
Hypertension Among Dental Patients: A Single Institution Experience And Development Of A Working Clinical Algorithm For Dental Practitioners
Published 2026journal::journal article -
10
-
11
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
12
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…It provides a general framework for constructing and analyzing authentication protocols in realistic models of communication networks. …”
Get full text
Get full text
Thesis -
14
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…This information can be collected with the aid of neighbor protocol. In this thesis an enhanced neighbor protocol (ENP) has been developed to collect and maintain 2-hop neighbor information at each node. …”
Get full text
Get full text
Get full text
Thesis -
15
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009“…In addition, at the end we will give some future directions, which can be helpful in order to construct the algorithms for such environments.…”
Get full text
Get full text
Conference or Workshop Item -
16
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009“…In addition, at the end we will give some future directions, which can be helpful in order to construct the algorithms for such environments.…”
Get full text
Get full text
Conference or Workshop Item -
17
Smart site monitoring system / Muhammad Azmi and Muhammad Naim Mahyuddin
Published 2023“…The Smart Site Monitoring System is an innovative and integrated approach designed to optimise a construction site management. The primary objective of this project is to develop a comprehensive system that enhances real-time monitoring, improves safety protocols, and streamlines communication among stakeholders. …”
Get full text
Get full text
Conference or Workshop Item -
18
A reliable unicast routing protocol for mobile ad hoc network
Published 2013“…In this thesis, both these schemes are used to develop a reliable unicast routing protocol for MANETs. …”
Get full text
Get full text
Thesis -
19
TELE-OPERATED ROBOT USING VC PROGRAMMING PROTOCOL
Published 2007Get full text
Get full text
Final Year Project -
20
Clustering Approach In Wireless Sensor Networks Based On K-Means: Limitations And Recommendations
Published 2019“…This algorithm has beneficial in construct the clusters for various real-world applications of WSN.K-means algorithm suffering from many drawbacks that hampering his work.The lack of adequate studies that investigates in the limitations of this algorithm and seek to propose the solutions motivated us to do this study. …”
Get full text
Get full text
Get full text
Article
