Search Results - (( its application protocol algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…The communications domain has utilized the implementation of protocols for a wide spectrum of applications. This encompasses Medium Access Control (MAC) protocols. …”
    Get full text
    Get full text
    Article
  5. 5

    MCRP: multiple chain routing protocol for energy efficiency in homogeneous wireless sensor networks by Kareem, Husam, Hashim, Shaiful Jahari, Sali, Aduwati, Taha, Omer W., Kazim, Issraa J., Shukri, Shaimaa

    Published 2019
    “…Simulation results demonstrate that the presented algorithm MCRP achieves its design goals and outperforms the existing work such as Chain-Chain based routing protocol (CCBRP), and Two-stage chain routing protocol (TSCP) algorithms in terms of Network lifetime, FND and LND (first node and last node died), Network stability period, and Energy consumption.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap by Masirap, Madzirin

    Published 2014
    “…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap by Masirap, Madzirin

    Published 2014
    “…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…Any MANET node requires a protocol in order to communicate with its neighbor within its transmission range. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20