Search Results - (( developing mac protocol algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2

    Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network by Jahan, Mohammad Saukat

    Published 2015
    “…First, the proposed incomplete cooperative game theoretic based MAC (GT-MAC) protocol, improves on the existing wireless sensor MAC protocols by offering significant network performance and lifetime extensions over the existing IEEE 802.15.4\Zigbee standards based WSN protocols. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…MAC protocols have been extensively researched from several angles. …”
    Get full text
    Get full text
    Article
  6. 6

    Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal by Abubakar Bello , Tambawal

    Published 2020
    “…In this thesis, a new approach called enhanced cluster-based TDMA MAC (EC-TMAC) protocol was developed to address these challenges. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Computational model for energy aware TDMA-based MAC protocol for wireless sensor network system by A. Rashid, Rozeha, Ehsan, Wan Mohd. Arif, Zaharim, Azami, Fisal, Norsheila

    Published 2007
    “…This paper proposes a novel approach that tries to reduce idle energy consumption by implementing active-sleep algorithm named energy aware A-MAC protocol. The result from the computational model shows that the algorithm can prolong the network lifetime due to efficiency in energy consumption from time slot management.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring by Al-Mekhlafi, Mohamed Abdulkarem Taher

    Published 2021
    “…Some of these challenges result from the transmission of huge amounts of data in each data sensing period and the complexity of SHM algorithms. Furthermore, in WSNs, the operating system (OS) with its network protocol stack and media access control (MAC) layer protocol play an essential role in managing the scarce resources, data processing and communication. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Software Development For Conversion Of Ip To Wireless Atm (Watm) by Sudhakar, Swarnappa Clement

    Published 2002
    “…In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15
  16. 16

    Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman by Osman, Noor Diyana

    Published 2014
    “…The last part is the development of a metal artifact correction (MAC) algorithm and evaluation of the proposed algorithm in artifacts reduction in CT images. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Performance Comparison of Packet Queuing Algorithm in Wireless Networks by Nor Aida, Mahiddin, Raja Hasyifah, Raja Bongsu, Wan Nor Shuhadah, Wan Nik

    Published 2014
    “…The implementation consider the unfairness problem for the per flow throughput in IEEE 802.11 without the modification of the MAC protocol. We simulate the enhanced packet queuing algorithm using OMNET++. …”
    Get full text
    Get full text
    Article
  18. 18

    Performance Comparison of Packet Queuing Algorithm in Wireless Networks by Nor Aida, Mahiddin, Raja Hasyifah, Raja Bongsu, Wan Nor Shuhadah, Wan Nik

    Published 2014
    “…The implementation consider the unfairness problem for the per flow throughput in IEEE 802.11 without the modification of the MAC protocol. We simulate the enhanced packet queuing algorithm using OMNET++. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
    Get full text
    Get full text
    Thesis
  20. 20

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…These characteristics of the wireless sniffer, provides a foundation for development of more advance monitoring tool that explicitly leveraging on the sequence number field in IEEE 802.11 MAC header.…”
    Get full text
    Get full text
    Thesis