Search Results - (( java application customization algorithm ) OR ( using case protocol algorithm ))

Refine Results
  1. 1

    Developing A Control Protocol Algorithm For Stimulating The Street Light System by Wong, Kwo Yiang

    Published 2017
    “…Thus, smart protocol algorithm is developed to replace the previous system. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Reliable low power network protocol in IoT for agriculture field by Wong, Christopher Jin Soon

    Published 2024
    “…Existing research in energy efficient network protocols have problems with reliability or weaknesses that make them unsuitable for direct use in agriculture use cases. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…To facilitate communication within the network, a routing protocol is used to dis- cover routes between nodes. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources by Al‐Sharafi, Ali Mohammed Ali

    Published 2008
    “…This is an extension to AMTree Protocol. The results from experiments show that handoff latency using the new algorithms is much lower than using AMTree handoff procedure in both cases, i.e. when the source connects to a subscribed base station or not subscribed base station. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm. by Jasem, Hayder Natiq, Ahmad Zukarnain, Zuriati, Mohamed, Othman, Subramaniam, Shamala

    Published 2010
    “…In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the New-AIMD algorithm to measure the queue length and end-to-end delays and we will use the NCTUns simulator to get the results after make the modification of the mechanism. …”
    Get full text
    Get full text
    Article
  7. 7

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Embedded Ethernet System For Real-Time Communication by Thiagarajan, Durgesh

    Published 2018
    “…The Ethernet network model is used to analyze the performance of the backoff algorithm in a different number of nodes. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions by Abbas O.K., Abdullah F., Radzi N.A.M., Salman A.D., Abdulkadir S.J.

    Published 2025
    “…The survey concluded that protocol designers must focus on the development and implementation of fire-adaptive routing protocols, incorporating optimal fault tolerance routing algorithms that adapt seamlessly to unforeseen environmental changes, including fire incidents. …”
    Article
  10. 10
  11. 11

    Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks by Qadawi, Zahraa D.A.

    Published 2013
    “…Secondly, to increase the efficiency of EBA-15.4MAC algorithm, we propose a new scheme to resolve the problem of access collision arising from the small number of backoff exponent used by CSMA-CA. …”
    Get full text
    Get full text
    Thesis
  12. 12

    High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring by Al-Mekhlafi, Mohamed Abdulkarem Taher

    Published 2021
    “…A synchronization model is presented with the aid of the implemented Contiki's implicit network time synchronization scheme. Finally, a case study of a WSN-based SHM system using developed embedded data filtering and transmission algorithms to reduce data communication is performed and taken place on a concrete beam at Civil Engineering Structure Laboratory, UPM. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Clustering network traffic utilization by Mohd Khairudin, Nazli, Muda, Zaiton, Mustapha, Aida, Nagarathinam, Yogeswaran, Salleh, Mohd. Sidek

    Published 2013
    “…Classification of network traffic using distinctive characteristic application is not ideal for P2P and HTTP protocols. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A NEW ENERGY EFFICIENT ADAPTIVE HYBRID ERROR CORRECTION TECHNIQUE FOR UNDERWATER WIRELESS SENSORS NETWORKS by HASSAN, AMMAR ELYAS BABIKER HASSAN

    Published 2011
    “…When the battery is depleted the sensor is of no use anymore. So designing energy efficient communication protocols is an important issue for underwater sensors networks. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Implement routing protocols for VANET in a one-way environment by Mohammed D., Mansor M.B., Hock G.C.

    Published 2024
    “…The MATLAB software was used to analyze the performance of the routing protocols for the VANET. …”
    Conference Paper
  19. 19
  20. 20

    Strategies for effective value management practice in construction industry by Zulhkiple, A. Bakar

    Published 2017
    “…To demonstrate the validity and efficiency of the proposed optimisation algorithm, various case studies were conducted in Malaysia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis