Search Results - (( developing construction protocol algorithm ) OR ( java implication new algorithm ))

Refine Results
  1. 1

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The first step of the proposed protocol involves the development of an energy efficient clustering algorithm which is appropriate for WSN with a sparse density topology. …”
    Get full text
    Get full text
    Thesis
  2. 2

    QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol by Addie Irawan, Hashim, R. Badlishah, Ahmad

    Published 2006
    “…This article describes the study of improving the proposed protocol called Receiverinitiated WDM Tree Construction (R-IWDMTC) protocol. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Strategies for effective value management practice in construction industry by Zulhkiple, A. Bakar

    Published 2017
    “…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol by Al-Alak, Saif M. Kh.

    Published 2014
    “…The Wireless Sensor Network (WSN) is defined to connect the sensors by using a set of protocols. The IEEE 802.15.4 standard includes the required protocols to construct a WSN. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…It provides a general framework for constructing and analyzing authentication protocols in realistic models of communication networks. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…This information can be collected with the aid of neighbor protocol. In this thesis an enhanced neighbor protocol (ENP) has been developed to collect and maintain 2-hop neighbor information at each node. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…In addition, at the end we will give some future directions, which can be helpful in order to construct the algorithms for such environments.…”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…In addition, at the end we will give some future directions, which can be helpful in order to construct the algorithms for such environments.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Smart site monitoring system / Muhammad Azmi and Muhammad Naim Mahyuddin by Azmi, Muhammad, Mahyuddin, Muhammad Naim

    Published 2023
    “…The Smart Site Monitoring System is an innovative and integrated approach designed to optimise a construction site management. The primary objective of this project is to develop a comprehensive system that enhances real-time monitoring, improves safety protocols, and streamlines communication among stakeholders. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A reliable unicast routing protocol for mobile ad hoc network by Sargolzaey, Hadi

    Published 2013
    “…In this thesis, both these schemes are used to develop a reliable unicast routing protocol for MANETs. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Clustering Approach In Wireless Sensor Networks Based On K-Means: Limitations And Recommendations by Hassan, Ali Abdul-hussian, Md Shah, Wahidah, Husien, Ali Mohamed, Talib, Mohammed Saad, Mohammed, Ali Abdul Jabbar, Othman, Mohd Fairuz Iskandar

    Published 2019
    “…This algorithm has beneficial in construct the clusters for various real-world applications of WSN.K-means algorithm suffering from many drawbacks that hampering his work.The lack of adequate studies that investigates in the limitations of this algorithm and seek to propose the solutions motivated us to do this study. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman by Osman, Noor Diyana

    Published 2015
    “…The first part is the development of a simple phantom useful for metal streaking analysis performed in the second part of this work. …”
    Get full text
    Get full text
    Book Section
  19. 19

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…This paper present a wireless sniffer monitoring tool, as well as the analysis and development process of constructing it. The goal is to design a wireless sniffer that can automatically detect spoofing and provide simple network statistic. …”
    Get full text
    Get full text
    Thesis
  20. 20