Search Results - (( developing emerging protocol algorithm ) OR ( java implication _ algorithm ))
Search alternatives:
- developing emerging »
- protocol algorithm »
- emerging protocol »
- java implication »
-
1
GPS-less Localization Protocol for Underwater Acoustic Networks
Published 2008“…Second, involving more remote nodes becoming seed nodes for further discoveries. Four different algorithms have been investigated; (i) Farthest/Farthest Algorithm, (ii) Farthest/Nearest Algorithm, (iii) Nearest/Farthest Algorithm and (iv) Nearest/Nearest Algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal
Published 2020“…In this thesis, a new approach called enhanced cluster-based TDMA MAC (EC-TMAC) protocol was developed to address these challenges. …”
Get full text
Get full text
Get full text
Thesis -
3
Performance Analysis of Routing Protocols in Resource-Constrained Opportunistic Networks
Published 2019“…Recently, opportunistic networks are considered as one of the most attractive developments of ad hoc mobile networks (MANETs) that have emerged thanks to the development of intelligent devices. …”
Get full text
Get full text
Get full text
Article -
4
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
Get full text
Get full text
Thesis -
5
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014Get full text
Get full text
Conference or Workshop Item -
6
HDRA: A Haybird Data Reduction and Routing Algorithm
Published 2024“…Overall, the proposed algorithm enhances network performance by conserving energy and extending network lifespan.…”
Get full text
Get full text
Get full text
Article -
7
-
8
Optimal forwarding routing protocol in ipv6-based wireless sensor network
Published 2009“…Here, actual performance of OF routing protocol is evaluated and compared with Greedy Forwarding and RIP routing protocol in WSN test bed. …”
Get full text
Get full text
Thesis -
9
HDRA: A Haybird Data Reduction and Routing Algorithm
Published 2024“…Overall, the proposed algorithm enhances network performance by conserving energy and extending network lifespan.…”
Get full text
Get full text
Get full text
Article -
10
-
11
Improving the security model of software define networks
Published 2023“…An by securing the connection between the main controller and northbound administration with the use of certain algorithm hashing protocol, it would further increase the security of the command line in the whole network. …”
text::Final Year Project -
12
Secure address resolution protocol proxy in software defined network
Published 2018“…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
SNR-Based OLSR Routing Protocol for Wireless Mesh Networks
Published 2009“…In the second stage of this work a new routing technique for WMNs based-on Signal to noise ratio (SNR) as a new metric for OLSR routing protocol, is developed. The new metric has been implemented on the OLSR routing protocol module using OPNET simulator. …”
Get full text
Get full text
Thesis -
14
-
15
Cauchy Density-based Algorithm for VANETs Clustering in 3D Road Environments
Published 2022“…This paper tackles the problem of 3D VANETs using a centralized clustering model based on the developed Cauchy density model. The development has included a traffic generation model, mobility model for generating driving behavior, and an algorithm for enabling modeling of road curvature based on an adjacency list that defines the road’s points that define a straight-line segment. …”
Get full text
Get full text
Article -
16
Towards developing smart environment using wireless sensor and ad hoc networks
Published 2006“…With the advancements of such optimization techniques for hardware, algorithms, and protocols for networking, various wireless technologies have also emerged. …”
Get full text
Get full text
Proceeding Paper -
17
Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network
Published 2016“…An appropriate, efficient, and stable routing algorithm must be developed for various VANET applications to address the issues of dynamic topology and intermittent connectivity. …”
Get full text
Get full text
Article -
18
Applications of drones in emerging economies: a case study of Malaysia
Published 2019Get full text
Get full text
Conference or Workshop Item -
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
