Search Results - (( development among protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- protocol algorithm »
- development among »
- implication based »
- java implication »
- among protocol »
-
1
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…Thus, the LDPC code encoder model is developed to identify a low complexity encoding algorithm of LDPC code for the DF protocol relay system. …”
Get full text
Get full text
Get full text
Thesis -
2
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
Published 2008“…The first algorithm is developed to avoid the buffer overflow in the FS nodes. …”
Get full text
Get full text
Thesis -
3
-
4
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. …”
Get full text
Get full text
Thesis -
5
Hypertension Among Dental Patients: A Single Institution Experience And Development Of A Working Clinical Algorithm For Dental Practitioners
Published 2026journal::journal article -
6
-
7
Performance analysis of multipath routing based on source routing
Published 2010Get full text
Working Paper -
8
Computational model for energy aware TDMA-based MAC protocol for wireless sensor network system
Published 2007“…This paper proposes a novel approach that tries to reduce idle energy consumption by implementing active-sleep algorithm named energy aware A-MAC protocol. The result from the computational model shows that the algorithm can prolong the network lifetime due to efficiency in energy consumption from time slot management.…”
Get full text
Get full text
Conference or Workshop Item -
9
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
10
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Research in secure data transfer on network layer has been discussed in detail on the importance to have secure Internet protocol in E-Commerce environment. This particular research successfully produced a protocol to suit AES encryption algorithm in Internet Protocol Security (IPSec).…”
Get full text
Get full text
Monograph -
12
-
13
SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges
Published 2024“…Finally, the challenges and upcoming research directions for developing such protocols are widely stated here. By presenting such insights, this paper provides a comprehensive overview and inspires researchers to enhance existing protocols and explore novel solutions, thereby paving the way for innovation in this field.…”
Get full text
Get full text
Get full text
Article -
14
A new routing metric for DYMO protocol on mobile AD HOC network
Published 2013“…Simulations scenarios are used for the work of the research by develop the new routing metrics in DYMO protocol module in OMNET++. …”
Get full text
Get full text
Get full text
Thesis -
15
HDRA: A Haybird Data Reduction and Routing Algorithm
Published 2024“…Presently, wireless sensor networks (WSNs) are emerging as a vibrant field of research due to various challenging aspects such as energy consumption, routing strategies, effectiveness, among others. Despite unresolved issues within WSNs, a substantial array of applications has already been developed. …”
Get full text
Get full text
Get full text
Article -
16
SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges
Published 2025“…Finally, the challenges and upcoming research directions for developing such protocols are widely stated here. By presenting such insights, this paper provides a comprehensive overview and inspires researchers to enhance existing protocols and explore novel solutions, thereby paving the way for innovation in this field. …”
Article -
17
HDRA: A Haybird Data Reduction and Routing Algorithm
Published 2024“…Presently, wireless sensor networks (WSNs) are emerging as a vibrant field of research due to various challenging aspects such as energy consumption, routing strategies, effectiveness, among others. Despite unresolved issues within WSNs, a substantial array of applications has already been developed. …”
Get full text
Get full text
Get full text
Article -
18
Stability improved of improved low energy adaptive clustering hierarchy routing protocol for wireless sensor network
Published 2017“…Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the prominent WSN protocol which is developed to prolong the network lifetime by utilizing energy efficient clustering technique. …”
Get full text
Get full text
Get full text
Thesis -
19
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…This information can be collected with the aid of neighbor protocol. In this thesis an enhanced neighbor protocol (ENP) has been developed to collect and maintain 2-hop neighbor information at each node. …”
Get full text
Get full text
Get full text
Thesis -
20
Elastic-TCP: flexible congestion control algorithm to adapt for high-BDP networks
Published 2019“…As known, the Transmission Control Protocol (TCP) is the predominant protocol used to provide such connectivity among these data centers. …”
Get full text
Get full text
Get full text
Article
