Search Results - (( developing world protocol algorithm ) OR ( java implication tree algorithm ))

Refine Results
  1. 1

    Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network by Jahan, Mohammad Saukat

    Published 2015
    “…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Performance evaluation of mobile ad hoc network in wireless LAN / Norfadhilah Hasan by Hasan, Norfadhilah

    Published 2005
    “…Mobile Ad-hoc Network (MANET) is becoming increasingly important in today's world and a number of protocols have been developed for them. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    EZ-SEP: extended Z-SEP routing protocol with hierarchical clustering approach for wireless heterogeneous sensor network by Nurlan, Zhanserik, Zhukabayeva, Tamara, Othman, Mohamed

    Published 2021
    “…To improve and extend the life of WSNs, scientists around the world regularly develop various routing protocols that minimize and optimize the energy consumption of sensor network nodes. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Stability improved of improved low energy adaptive clustering hierarchy routing protocol for wireless sensor network by Sabah Talib, Al-Zubaidi Ammar

    Published 2017
    “…Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the prominent WSN protocol which is developed to prolong the network lifetime by utilizing energy efficient clustering technique. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Elastic-TCP: flexible congestion control algorithm to adapt for high-BDP networks by Alrshah, Mohamed Alhadi Mahmoud, Al-Moqri, Mohamed A., Othman, Mohamed

    Published 2019
    “…As known, the Transmission Control Protocol (TCP) is the predominant protocol used to provide such connectivity among these data centers. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Stability improvement low energy adaptive clustering hierarchy routing (sileach) protocol for wireless sensor network by Jasim, Al-Haddad Zaid Ali

    Published 2017
    “…Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the prominent WSN protocols which is developed to prolong the network lifetime by utilizing energy efficient clustering technique. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications by IZZAH NILAMSYUKRIYAH, BUANG, Kartinah, Zen, Syahrul Nizam, Junaini

    Published 2025
    “…Despite notable advancements, significant opportunities remain for enhancing scalability, developing hybrid solutions, applying these methodologies in real-world contexts, and implementing robust security protocols. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Clustering Approach In Wireless Sensor Networks Based On K-Means: Limitations And Recommendations by Hassan, Ali Abdul-hussian, Md Shah, Wahidah, Husien, Ali Mohamed, Talib, Mohammed Saad, Mohammed, Ali Abdul Jabbar, Othman, Mohd Fairuz Iskandar

    Published 2019
    “…This algorithm has beneficial in construct the clusters for various real-world applications of WSN.K-means algorithm suffering from many drawbacks that hampering his work.The lack of adequate studies that investigates in the limitations of this algorithm and seek to propose the solutions motivated us to do this study. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    The Implementation of a Machine Learning-based Routing Algorithm in a Lab-Scale Testbed by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Ahmad A., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…Due to network complexity, conventional QoS-improving routing algorithms (RAs) may be impractical. Thus, researchers are developing intelligent RAs, including machine learning (ML)-based algorithms to meet traffic Q oS r equirements. …”
    Conference Paper
  11. 11

    Mobility management for IoT: a survey by M. Ghaleb, Safwan, Subramaniam, Shamala, Ahmed Zukarnain, Zuriati, Muhammed, Abdullah

    Published 2016
    “…IP mobility management is utilized as a mechanism to resolve these issues. The management protocols introduced to support mobility has evolved from host-based to network-based mobility management protocols. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Windows-Based bandwidth allocation on optical networks by Mahadevan, V., Yu, W., Zhou, J.

    Published 2009
    “…We hope in the next article we will make a comparison table among static and dynamic bandwidth allocations algorithms and propose an algorithm on dynamic bandwidth allocation and evaluate our proposed algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16

    A smart metering for energy management system via GSM-SMS based protocol by Fakharuddin, Azhar

    Published 2011
    “…Energy resources and their management is one of the prime challenges to world especially developing countries like Malaysia where the significant contribution to energy generation is based on imported resources. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Benchmarking Robust Machine Learning Models Under Data Imperfections in Real-World Data Science Scenarios by Marlindawati, ., Mohammad, Azhar, Esha, Sabir

    Published 2026
    “…Despite substantial progress in model development, most evaluation protocols rely on clean benchmark datasets, creating a gap between laboratory performance and operational reliability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Analysable Chaos-based Design Paradigms For Cryptographic Applications by Abba, Abubakar

    Published 2024
    “…First, an in-depth review is conducted on the current state-of-the-art in the field of chaos-based cryptographic algorithms to identify the challenges of various design and evaluation methods that have been developed over the years. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Static bandwidth allocation on optical networks by Mahadevan, V., Yu, W., Zhou, J.

    Published 2009
    “…A detailed understanding of the many facets of the Internet's topological structure is critical for evaluating the performance of networking protocols, for assessing the effectiveness of proposed techniques to protect the network from nefarious intrusions and attacks, or for developing improved designs for resource provisioning. …”
    Get full text
    Get full text
    Conference or Workshop Item