Search Results - (( development group protocol algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks by Alahdal, Tariq A. A.

    Published 2008
    “…The first algorithm is developed to avoid the buffer overflow in the FS nodes. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The first step of the proposed protocol involves the development of an energy efficient clustering algorithm which is appropriate for WSN with a sparse density topology. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering by Umelo, Nnamdi Henry, Noordin, Nor Kamariah, A. Rasid, Mohd Fadlee, Tan, Kim Geok, Hashim, Fazirulhisyam

    Published 2023
    “…Variants of the proposed kg-DFSA, traditional DFSA and another grouping based DFSA algorithm (FCM-DFSA) were implemented in MATLAB. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network by Jahan, Mohammad Saukat

    Published 2015
    “…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…This evaluation is done by means of simulation using NS-2 developed by University California Berkeley. There are several ad hoc routing protocols, such as AODV, DSR, and DSDV that propose solutions for routing within a mobile ad hoc network. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…This algorithm verifies the identity and permission of non-group members to meet the strict privacy protection requirements of EHRs data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Position-based multicast routing in mobile ad hoc networks: an analytical study by Qabajeh, Mohammad M., Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Qabajeh, Liana K.

    Published 2012
    “…In this paper, we investigate the scalability problem of these routing protocols. In particular, a Position-Based QoS Multicast Routing Protocol (PBQMRP) has been developed. …”
    Get full text
    Get full text
    Article
  12. 12

    Windows-Based bandwidth allocation on optical networks by Mahadevan, V., Yu, W., Zhou, J.

    Published 2009
    “…We hope in the next article we will make a comparison table among static and dynamic bandwidth allocations algorithms and propose an algorithm on dynamic bandwidth allocation and evaluate our proposed algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    SNR-Based OLSR Routing Protocol for Wireless Mesh Networks by Elobaid, Mohamed Elshaikh

    Published 2009
    “…In the second stage of this work a new routing technique for WMNs based-on Signal to noise ratio (SNR) as a new metric for OLSR routing protocol, is developed. The new metric has been implemented on the OLSR routing protocol module using OPNET simulator. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…Next, an enhanced version of the proposed Scalable and Efficient Key Management Protocol called extended SEKMP (E-SEKMP) is developed based on SEKMP. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Dual authentication for bluetooth connection by Saliou, Diallo Alhassane, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Energy Efficient LEACH (EE-LEACH) Routing Algorithm for Wireless Sensor Networks by Pillay, Kosheila Sundram

    Published 2019
    “…Low energy adaptive clustering hierarchy (LEACH) routing protocol was developed to provide better energy efficiency in WSN due to its structural organization. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Static bandwidth allocation on optical networks by Mahadevan, V., Yu, W., Zhou, J.

    Published 2009
    “…A detailed understanding of the many facets of the Internet's topological structure is critical for evaluating the performance of networking protocols, for assessing the effectiveness of proposed techniques to protect the network from nefarious intrusions and attacks, or for developing improved designs for resource provisioning. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Router-Based bandwidth allocation on optical networks by Mahadevan, V., Yu, W., Zhou, J.

    Published 2009
    “…A detailed understanding of the many facets of the Internet's topological structure is critical for evaluating the performance of networking protocols, for assessing the effectiveness of proposed techniques to protect the network from nefarious intrusions and attacks, or for developing improved designs for resource provisioning. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20