Search Results - (( development organization protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- development organization »
- organization protocol »
- protocol algorithm »
- implication based »
- java implication »
-
1
A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks
Published 2019“…Since the sensors have the characteristics of self-organizing and low cost and the wireless sensor network develops rapidly, more reliable routing algorithms are required to perform better forwarding. …”
Get full text
Get full text
Thesis -
2
Even-odd scheduling based energy efficient routing for wireless sensor network (WSN) / Muhammad Zafar Iqbal Khan
Published 2022“…Several routing protocols have been developed and proposed in the literature for the development of energy-efficient routing strategies of Wireless Sensor Networks. …”
Get full text
Get full text
Thesis -
3
-
4
Performance analysis of multipath routing based on source routing
Published 2010Get full text
Working Paper -
5
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…Ad hoc on-demand distance vector routing protocol (AODV) is a commonly used protocol in MANET. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
SNR-Based OLSR Routing Protocol for Wireless Mesh Networks
Published 2009“…In the second stage of this work a new routing technique for WMNs based-on Signal to noise ratio (SNR) as a new metric for OLSR routing protocol, is developed. The new metric has been implemented on the OLSR routing protocol module using OPNET simulator. …”
Get full text
Get full text
Thesis -
8
Moving vehicle identification using artificial neural network
Published 2012Get full text
Working Paper -
9
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…This information can be collected with the aid of neighbor protocol. In this thesis an enhanced neighbor protocol (ENP) has been developed to collect and maintain 2-hop neighbor information at each node. …”
Get full text
Get full text
Get full text
Thesis -
10
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
Published 2010“…The system has been analyzed, algorithms that simulate the main immune mechanisms have been mapped out, and a security framework that incorporates different immune mechanisms has been developed. …”
Get full text
Get full text
Thesis -
12
Clustering Approach In Wireless Sensor Networks Based On K-Means: Limitations And Recommendations
Published 2019“…One of most popular cluster algorithms that utilizing into organize sensor nodes is K-means algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Dual authentication for bluetooth connection
Published 2014“…Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Article -
14
Energy Efficient LEACH (EE-LEACH) Routing Algorithm for Wireless Sensor Networks
Published 2019“…Low energy adaptive clustering hierarchy (LEACH) routing protocol was developed to provide better energy efficiency in WSN due to its structural organization. …”
Get full text
Get full text
Thesis -
15
Radiation dose, cancer risk and diagnostic performance of computed tomography pulmonary angiography examination
Published 2021“…Different levels of IR algorithms were applied in routine CTPA and several modified tube potentials. …”
Get full text
Get full text
Thesis -
16
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
17
Multi-dimensional networking and distributed computing services
Published 2012“…The multi-dimensional research issues include wireless and mobility problems, routing protocols and algorithms, resource and service location protocols, performance evaluations of networking systems, ubiquitous systems, context aware ubiquitous environment, mechanisms to improve throughput over wireless links, network management and network security, and other related areas. …”
Get full text
Get full text
Get full text
Article -
18
Utility of satellite imagery in estimating coastal marine water attributes
Published 2025“…We further examine prevalent algorithmic approaches and validation metrics. Findings indicate that most studies rely on data from Aqua, Sentinel, and Landsat satellites. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…Next, an enhanced version of the proposed Scalable and Efficient Key Management Protocol called extended SEKMP (E-SEKMP) is developed based on SEKMP. …”
Get full text
Get full text
Thesis
