Search Results - (( development group protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- protocol algorithm »
- development group »
- implication based »
- java implication »
- group protocol »
-
1
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
Published 2008“…The first algorithm is developed to avoid the buffer overflow in the FS nodes. …”
Get full text
Get full text
Thesis -
2
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…The first step of the proposed protocol involves the development of an energy efficient clustering algorithm which is appropriate for WSN with a sparse density topology. …”
Get full text
Get full text
Thesis -
3
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…Variants of the proposed kg-DFSA, traditional DFSA and another grouping based DFSA algorithm (FCM-DFSA) were implemented in MATLAB. …”
Get full text
Get full text
Article -
4
Quality of service multicast routing protocol for large scale MANETs
Published 2009Get full text
Get full text
Get full text
Proceeding Paper -
5
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
Published 2006“…This evaluation is done by means of simulation using NS-2 developed by University California Berkeley. There are several ad hoc routing protocols, such as AODV, DSR, and DSDV that propose solutions for routing within a mobile ad hoc network. …”
Get full text
Get full text
Thesis -
9
Secure lightweight client for cloud-based E-Health Model
Published 2023“…This algorithm verifies the identity and permission of non-group members to meet the strict privacy protection requirements of EHRs data. …”
Get full text
Get full text
Get full text
Thesis -
10
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Position-based multicast routing in mobile ad hoc networks: an analytical study
Published 2012“…In this paper, we investigate the scalability problem of these routing protocols. In particular, a Position-Based QoS Multicast Routing Protocol (PBQMRP) has been developed. …”
Get full text
Get full text
Article -
12
Windows-Based bandwidth allocation on optical networks
Published 2009“…We hope in the next article we will make a comparison table among static and dynamic bandwidth allocations algorithms and propose an algorithm on dynamic bandwidth allocation and evaluate our proposed algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
13
SNR-Based OLSR Routing Protocol for Wireless Mesh Networks
Published 2009“…In the second stage of this work a new routing technique for WMNs based-on Signal to noise ratio (SNR) as a new metric for OLSR routing protocol, is developed. The new metric has been implemented on the OLSR routing protocol module using OPNET simulator. …”
Get full text
Get full text
Thesis -
14
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…Next, an enhanced version of the proposed Scalable and Efficient Key Management Protocol called extended SEKMP (E-SEKMP) is developed based on SEKMP. …”
Get full text
Get full text
Thesis -
15
Dual authentication for bluetooth connection
Published 2014“…Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Article -
16
Energy Efficient LEACH (EE-LEACH) Routing Algorithm for Wireless Sensor Networks
Published 2019“…Low energy adaptive clustering hierarchy (LEACH) routing protocol was developed to provide better energy efficiency in WSN due to its structural organization. …”
Get full text
Get full text
Thesis -
17
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
18
Static bandwidth allocation on optical networks
Published 2009“…A detailed understanding of the many facets of the Internet's topological structure is critical for evaluating the performance of networking protocols, for assessing the effectiveness of proposed techniques to protect the network from nefarious intrusions and attacks, or for developing improved designs for resource provisioning. …”
Get full text
Get full text
Conference or Workshop Item -
19
Router-Based bandwidth allocation on optical networks
Published 2009“…A detailed understanding of the many facets of the Internet's topological structure is critical for evaluating the performance of networking protocols, for assessing the effectiveness of proposed techniques to protect the network from nefarious intrusions and attacks, or for developing improved designs for resource provisioning. …”
Get full text
Get full text
Conference or Workshop Item -
20
