Search Results - (( developing state protocol algorithm ) OR ( java application bee algorithm ))

Refine Results
  1. 1

    Developing A Control Protocol Algorithm For Stimulating The Street Light System by Wong, Kwo Yiang

    Published 2017
    “…Thus, smart protocol algorithm is developed to replace the previous system. …”
    Get full text
    Get full text
    Monograph
  2. 2
  3. 3

    Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks by Alahdal, Tariq A. A.

    Published 2008
    “…The first algorithm is developed to avoid the buffer overflow in the FS nodes. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network by Jahan, Mohammad Saukat

    Published 2015
    “…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    EZ-SEP: extended Z-SEP routing protocol with hierarchical clustering approach for wireless heterogeneous sensor network by Nurlan, Zhanserik, Zhukabayeva, Tamara, Othman, Mohamed

    Published 2021
    “…To improve and extend the life of WSNs, scientists around the world regularly develop various routing protocols that minimize and optimize the energy consumption of sensor network nodes. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges by Hussein, Nehad Hameed, Koh, Siaw Paw, Yaw, Chong Tak, Tiong, Sieh Kiong, Benedict, F., Yusaf, Talal, K., Kadirgama, Tan, Chung Hong

    Published 2024
    “…Finally, the challenges and upcoming research directions for developing such protocols are widely stated here. By presenting such insights, this paper provides a comprehensive overview and inspires researchers to enhance existing protocols and explore novel solutions, thereby paving the way for innovation in this field.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Reliable Path Selection Packet Forwarding Routing Protocol for Vehicular Adhoc Networks by Irshad Ahmed, Abbasi

    Published 2019
    “…First of all, a detailed technical analysis, comparison, and drawbacks of the existing state of the art routing protocols are given. Then, a novel routing scheme called a Reliable Path Selection Packet Forwarding Routing Protocol (RPSPF) is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges by Hussein N.H., Koh S.P., Yaw C.T., Tiong S.K., Benedict F., Yusaf T., Kadirgama K., Hong T.C.

    Published 2025
    “…Finally, the challenges and upcoming research directions for developing such protocols are widely stated here. By presenting such insights, this paper provides a comprehensive overview and inspires researchers to enhance existing protocols and explore novel solutions, thereby paving the way for innovation in this field. …”
    Article
  9. 9

    SNR-Based OLSR Routing Protocol for Wireless Mesh Networks by Elobaid, Mohamed Elshaikh

    Published 2009
    “…The obtained results show that the Optimized link state routing protocol (OLSR) has the highestthroughput overDSR andAODVrouting protocols in WMNs. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Efficient Discovery Protocol for Ubiquitous Communication in Wireless Environment by Zarrin, Javad

    Published 2009
    “…In this research a new mechanism and algorithm is designed to improve current wireless service discovery protocols. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    A comprehensive analysis of surface electromyography for control of lower limb exoskeleton by Abdelhakim, Deboucha

    Published 2016
    “…A parametric model based on Hill Muscle Model (HMM) to estimate the knee joint moment is developed for both experiments protocols. The parametric model involves the mapping of the sEMG signals to the knee joint moment. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Designated Path Routing Algorithm For Dense Wireless Sensor Network by Subramaniam, Siva Kumar, Ikhwan Lee, Mohamad Yusry Lee, Feroz, Farah Shahnaz, Azman, Amierul Syazrul Azril

    Published 2021
    “…Ad hoc on-demand distance vector and optimized link state routing protocol have been simulated to investigate these issues further. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    The new enhancement of OLSR energy-saving system in ADHOC network / Suhazlan Suhaimi by Suhaimi, Suhazlan

    Published 2018
    “…To help mitigate such a problem, the Optimize Link State Routing protocol (OLSR) is considered the most appropriate routing protocol to extend nodes’ lifespans. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…This protocol enables the client to transfer its computational operations to a specified proxy server securely. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  18. 18

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Analysable Chaos-based Design Paradigms For Cryptographic Applications by Abba, Abubakar

    Published 2024
    “…First, an in-depth review is conducted on the current state-of-the-art in the field of chaos-based cryptographic algorithms to identify the challenges of various design and evaluation methods that have been developed over the years. …”
    Get full text
    Get full text
    Thesis