Search Results - (( developing emerging protocol algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- developing emerging »
- protocol algorithm »
- emerging protocol »
- validation using »
- java validation »
- using algorithm »
-
1
GPS-less Localization Protocol for Underwater Acoustic Networks
Published 2008“…Second, involving more remote nodes becoming seed nodes for further discoveries. Four different algorithms have been investigated; (i) Farthest/Farthest Algorithm, (ii) Farthest/Nearest Algorithm, (iii) Nearest/Farthest Algorithm and (iv) Nearest/Nearest Algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal
Published 2020“…In this thesis, a new approach called enhanced cluster-based TDMA MAC (EC-TMAC) protocol was developed to address these challenges. …”
Get full text
Get full text
Get full text
Thesis -
3
Performance Analysis of Routing Protocols in Resource-Constrained Opportunistic Networks
Published 2019“…Recently, opportunistic networks are considered as one of the most attractive developments of ad hoc mobile networks (MANETs) that have emerged thanks to the development of intelligent devices. …”
Get full text
Get full text
Get full text
Article -
4
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
Get full text
Get full text
Thesis -
5
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014Get full text
Get full text
Conference or Workshop Item -
6
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
7
HDRA: A Haybird Data Reduction and Routing Algorithm
Published 2024“…Overall, the proposed algorithm enhances network performance by conserving energy and extending network lifespan.…”
Get full text
Get full text
Get full text
Article -
8
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Optimal forwarding routing protocol in ipv6-based wireless sensor network
Published 2009“…Here, actual performance of OF routing protocol is evaluated and compared with Greedy Forwarding and RIP routing protocol in WSN test bed. …”
Get full text
Get full text
Thesis -
11
HDRA: A Haybird Data Reduction and Routing Algorithm
Published 2024“…Overall, the proposed algorithm enhances network performance by conserving energy and extending network lifespan.…”
Get full text
Get full text
Get full text
Article -
12
-
13
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
14
Improving the security model of software define networks
Published 2023“…An by securing the connection between the main controller and northbound administration with the use of certain algorithm hashing protocol, it would further increase the security of the command line in the whole network. …”
text::Final Year Project -
15
Secure address resolution protocol proxy in software defined network
Published 2018“…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
16
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
SNR-Based OLSR Routing Protocol for Wireless Mesh Networks
Published 2009“…In the second stage of this work a new routing technique for WMNs based-on Signal to noise ratio (SNR) as a new metric for OLSR routing protocol, is developed. The new metric has been implemented on the OLSR routing protocol module using OPNET simulator. …”
Get full text
Get full text
Thesis -
18
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
19
-
20
Cauchy Density-based Algorithm for VANETs Clustering in 3D Road Environments
Published 2022“…This paper tackles the problem of 3D VANETs using a centralized clustering model based on the developed Cauchy density model. The development has included a traffic generation model, mobility model for generating driving behavior, and an algorithm for enabling modeling of road curvature based on an adjacency list that defines the road’s points that define a straight-line segment. …”
Get full text
Get full text
Article
