Search Results - (( developing world protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- protocol algorithm »
- implication based »
- developing world »
- java implication »
-
1
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. …”
Get full text
Get full text
Thesis -
2
Performance evaluation of mobile ad hoc network in wireless LAN / Norfadhilah Hasan
Published 2005“…Mobile Ad-hoc Network (MANET) is becoming increasingly important in today's world and a number of protocols have been developed for them. …”
Get full text
Get full text
Thesis -
3
Encryption method for SCADA security enhancement
Published 2014“…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
4
EZ-SEP: extended Z-SEP routing protocol with hierarchical clustering approach for wireless heterogeneous sensor network
Published 2021“…To improve and extend the life of WSNs, scientists around the world regularly develop various routing protocols that minimize and optimize the energy consumption of sensor network nodes. …”
Get full text
Get full text
Get full text
Article -
5
Stability improved of improved low energy adaptive clustering hierarchy routing protocol for wireless sensor network
Published 2017“…Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the prominent WSN protocol which is developed to prolong the network lifetime by utilizing energy efficient clustering technique. …”
Get full text
Get full text
Get full text
Thesis -
6
Elastic-TCP: flexible congestion control algorithm to adapt for high-BDP networks
Published 2019“…As known, the Transmission Control Protocol (TCP) is the predominant protocol used to provide such connectivity among these data centers. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Stability improvement low energy adaptive clustering hierarchy routing (sileach) protocol for wireless sensor network
Published 2017“…Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the prominent WSN protocols which is developed to prolong the network lifetime by utilizing energy efficient clustering technique. …”
Get full text
Get full text
Get full text
Thesis -
9
Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications
Published 2025“…Despite notable advancements, significant opportunities remain for enhancing scalability, developing hybrid solutions, applying these methodologies in real-world contexts, and implementing robust security protocols. …”
Get full text
Get full text
Get full text
Article -
10
Clustering Approach In Wireless Sensor Networks Based On K-Means: Limitations And Recommendations
Published 2019“…This algorithm has beneficial in construct the clusters for various real-world applications of WSN.K-means algorithm suffering from many drawbacks that hampering his work.The lack of adequate studies that investigates in the limitations of this algorithm and seek to propose the solutions motivated us to do this study. …”
Get full text
Get full text
Get full text
Article -
11
The Implementation of a Machine Learning-based Routing Algorithm in a Lab-Scale Testbed
Published 2024“…Due to network complexity, conventional QoS-improving routing algorithms (RAs) may be impractical. Thus, researchers are developing intelligent RAs, including machine learning (ML)-based algorithms to meet traffic Q oS r equirements. …”
Conference Paper -
12
Mobility management for IoT: a survey
Published 2016“…IP mobility management is utilized as a mechanism to resolve these issues. The management protocols introduced to support mobility has evolved from host-based to network-based mobility management protocols. …”
Get full text
Get full text
Get full text
Article -
13
Intrusion detection on the in-vehicle network using machine learning
Published 2021Get full text
Get full text
Get full text
Proceeding Paper -
14
Windows-Based bandwidth allocation on optical networks
Published 2009“…We hope in the next article we will make a comparison table among static and dynamic bandwidth allocations algorithms and propose an algorithm on dynamic bandwidth allocation and evaluate our proposed algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
17
Development of LabVIEW FPGA program for Energy Management System (EMS) Controller for Hybrid Electric Vehicle (HEV)
Published 2016Get full text
Get full text
Final Year Project -
18
A smart metering for energy management system via GSM-SMS based protocol
Published 2011“…Energy resources and their management is one of the prime challenges to world especially developing countries like Malaysia where the significant contribution to energy generation is based on imported resources. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Benchmarking Robust Machine Learning Models Under Data Imperfections in Real-World Data Science Scenarios
Published 2026“…Despite substantial progress in model development, most evaluation protocols rely on clean benchmark datasets, creating a gap between laboratory performance and operational reliability. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Analysable Chaos-based Design Paradigms For Cryptographic Applications
Published 2024“…First, an in-depth review is conducted on the current state-of-the-art in the field of chaos-based cryptographic algorithms to identify the challenges of various design and evaluation methods that have been developed over the years. …”
Get full text
Get full text
Thesis
