Search Results - (( developing technology connection algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network by Al-Mayouf, Y.R.B., Ismail, M., Abdullah, N.F., Wahab, A.W.A., Mahdi, O.A., Khan, S., Choo, R.K.K.

    Published 2016
    “…An appropriate, efficient, and stable routing algorithm must be developed for various VANET applications to address the issues of dynamic topology and intermittent connectivity. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14
  15. 15

    Characterization of Internet Traffic in UUM Wireless Networks by Abdullah, Wisam Dawood

    Published 2012
    “…Whereas, the growth of the wireless network with additional mobile devices in the UUM and increasing number of users led to slow wireless connection. Therefore, understanding the behavior of traffic analysis helps us to develop, manage WLAN technology, and deploy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Dual authentication for bluetooth connection by Saliou, Diallo Alhassane, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system by -, -

    Published 2019
    “…Recent advancement in 3D printing technology has led to the development of projection mask stereolithography 3D printing process. …”
    Get full text
    Get full text
    Research Report
  19. 19

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…In this paper we will explore the developments of some of the important routing algorithms, and a survey with different comparisons, those have been proposed for the partially connected underwater environments. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…In this paper we will explore the developments of some of the important routing algorithms, and a survey with different comparisons, those have been proposed for the partially connected underwater environments. …”
    Get full text
    Get full text
    Conference or Workshop Item