Search Results - (( developing failure protocol algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions by Abbas O.K., Abdullah F., Radzi N.A.M., Salman A.D., Abdulkadir S.J.

    Published 2025
    “…The survey concluded that protocol designers must focus on the development and implementation of fire-adaptive routing protocols, incorporating optimal fault tolerance routing algorithms that adapt seamlessly to unforeseen environmental changes, including fire incidents. …”
    Article
  2. 2

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The first step of the proposed protocol involves the development of an energy efficient clustering algorithm which is appropriate for WSN with a sparse density topology. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network by Al-Kharasani, Nori Mohammed Abdulkarem

    Published 2020
    “…This is because of the vehicles mobility and road obstacles, which cause link failure frequent inefficiency in traditional mobile ad hoc routing protocols. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…The objective of this thesis was to develop the TR protocol for ZigBee network and is called Improved Tree Routing (ImpTR) protocol which is computationally simple in finding the shortest path to transmit data packets to the sink node, and does not need any addition in hardware. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    A reliable unicast routing protocol for mobile ad hoc network by Sargolzaey, Hadi

    Published 2013
    “…In this thesis, both these schemes are used to develop a reliable unicast routing protocol for MANETs. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Energy Efficient LEACH (EE-LEACH) Routing Algorithm for Wireless Sensor Networks by Pillay, Kosheila Sundram

    Published 2019
    “…Low energy adaptive clustering hierarchy (LEACH) routing protocol was developed to provide better energy efficiency in WSN due to its structural organization. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  19. 19

    The new enhancement of OLSR energy-saving system in ADHOC network / Suhazlan Suhaimi by Suhaimi, Suhazlan

    Published 2018
    “…As such, this study was undertaken with the main aim to enhance the energy-saving system of MANET, with which nodes can function without failure by using a newly developed algorithm of the OLSR protocol. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…The performances of the proposed algorithms are then compared with the previously developed algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis