Search Results - (( development among protocol algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication by JAM'AAH, SUUD

    Published 2021
    “…Thus, the LDPC code encoder model is developed to identify a low complexity encoding algorithm of LDPC code for the DF protocol relay system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks by Alahdal, Tariq A. A.

    Published 2008
    “…The first algorithm is developed to avoid the buffer overflow in the FS nodes. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network by Jahan, Mohammad Saukat

    Published 2015
    “…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    Computational model for energy aware TDMA-based MAC protocol for wireless sensor network system by A. Rashid, Rozeha, Ehsan, Wan Mohd. Arif, Zaharim, Azami, Fisal, Norsheila

    Published 2007
    “…This paper proposes a novel approach that tries to reduce idle energy consumption by implementing active-sleep algorithm named energy aware A-MAC protocol. The result from the computational model shows that the algorithm can prolong the network lifetime due to efficiency in energy consumption from time slot management.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…Research in secure data transfer on network layer has been discussed in detail on the importance to have secure Internet protocol in E-Commerce environment. This particular research successfully produced a protocol to suit AES encryption algorithm in Internet Protocol Security (IPSec).…”
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13

    SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges by Hussein, Nehad Hameed, Koh, Siaw Paw, Yaw, Chong Tak, Tiong, Sieh Kiong, Benedict, F., Yusaf, Talal, K., Kadirgama, Tan, Chung Hong

    Published 2024
    “…Finally, the challenges and upcoming research directions for developing such protocols are widely stated here. By presenting such insights, this paper provides a comprehensive overview and inspires researchers to enhance existing protocols and explore novel solutions, thereby paving the way for innovation in this field.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A new routing metric for DYMO protocol on mobile AD HOC network by Salleh, Noor Amani

    Published 2013
    “…Simulations scenarios are used for the work of the research by develop the new routing metrics in DYMO protocol module in OMNET++. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    HDRA: A Haybird Data Reduction and Routing Algorithm by Hussein, M. K., Marghescu, Ion, A. M. Alduais, Nayef

    Published 2024
    “…Presently, wireless sensor networks (WSNs) are emerging as a vibrant field of research due to various challenging aspects such as energy consumption, routing strategies, effectiveness, among others. Despite unresolved issues within WSNs, a substantial array of applications has already been developed. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges by Hussein N.H., Koh S.P., Yaw C.T., Tiong S.K., Benedict F., Yusaf T., Kadirgama K., Hong T.C.

    Published 2025
    “…Finally, the challenges and upcoming research directions for developing such protocols are widely stated here. By presenting such insights, this paper provides a comprehensive overview and inspires researchers to enhance existing protocols and explore novel solutions, thereby paving the way for innovation in this field. …”
    Article
  17. 17

    HDRA: A Haybird Data Reduction and Routing Algorithm by M. K. Hussein, M. K. Hussein, Ion Marghescu, Ion Marghescu, Nayef A. M. Alduais, Nayef A. M. Alduais

    Published 2024
    “…Presently, wireless sensor networks (WSNs) are emerging as a vibrant field of research due to various challenging aspects such as energy consumption, routing strategies, effectiveness, among others. Despite unresolved issues within WSNs, a substantial array of applications has already been developed. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Stability improved of improved low energy adaptive clustering hierarchy routing protocol for wireless sensor network by Sabah Talib, Al-Zubaidi Ammar

    Published 2017
    “…Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the prominent WSN protocol which is developed to prolong the network lifetime by utilizing energy efficient clustering technique. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…This information can be collected with the aid of neighbor protocol. In this thesis an enhanced neighbor protocol (ENP) has been developed to collect and maintain 2-hop neighbor information at each node. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Elastic-TCP: flexible congestion control algorithm to adapt for high-BDP networks by Alrshah, Mohamed Alhadi Mahmoud, Al-Moqri, Mohamed A., Othman, Mohamed

    Published 2019
    “…As known, the Transmission Control Protocol (TCP) is the predominant protocol used to provide such connectivity among these data centers. …”
    Get full text
    Get full text
    Get full text
    Article