Search Results - (( developing some protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- protocol algorithm »
- implication based »
- java implication »
- developing some »
- some protocol »
-
1
Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study
Published 2017“…Various approaches of clustering algorithms are used to optimize the energy of routing protocols. …”
Get full text
Get full text
Get full text
Article -
2
-
3
An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design.
Published 2006“…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
Get full text
Patent -
4
-
5
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. …”
Get full text
Get full text
Get full text
Article -
7
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…Ad hoc on-demand distance vector routing protocol (AODV) is a commonly used protocol in MANET. …”
Get full text
Get full text
Get full text
Thesis -
9
A multidrop optical network testbed for EPON platform
Published 2023“…Although the microcontrollers have some limitations, the testbed can be used to test out protocols and algorithms for the EPON environment. �2010 IEEE.…”
Conference paper -
10
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
11
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009“…In this paper we will explore the developments of some of the important routing algorithms, and a survey with different comparisons, those have been proposed for the partially connected underwater environments. …”
Get full text
Get full text
Conference or Workshop Item -
12
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009“…In this paper we will explore the developments of some of the important routing algorithms, and a survey with different comparisons, those have been proposed for the partially connected underwater environments. …”
Get full text
Get full text
Conference or Workshop Item -
13
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…L-TDMA shows a remarkable ability to conserve power in comparison to other protocols in different operating systems. Finally, the implementation of the developed embedded algorithms for strain-based applications resulted in a power consumption reduction of 77% compared to centralized processing.…”
Get full text
Get full text
Thesis -
14
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…Next, the ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
text::Thesis -
15
Quality of service multicast routing protocol for large scale MANETs
Published 2009Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Dual authentication for bluetooth connection
Published 2014“…Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Article -
18
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
Published 2006“…This evaluation is done by means of simulation using NS-2 developed by University California Berkeley. There are several ad hoc routing protocols, such as AODV, DSR, and DSDV that propose solutions for routing within a mobile ad hoc network. …”
Get full text
Get full text
Thesis -
19
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…The key element in this approach is a modular treatment of the authentication problem in cryptographic protocols; this applies to the definition of security, to the design of the protocols, and to their analysis. …”
Get full text
Get full text
Thesis -
20
Hand gesture recognition in ASD related motion using YOLOv8 algorithm / Muhammad Afiq Mohd Ali
Published 2025“…Future work should help develop protocols that expand dataset availability and increase the model's accuracy while incorporating some complex AI algorithms to better support these fields in providing clinical and therapeutic applications.…”
Get full text
Get full text
Thesis
