Search Results - (( java implementation based algorithm ) OR ( using mac protocol algorithm ))
Search alternatives:
- implementation based »
- java implementation »
- protocol algorithm »
- using mac »
-
1
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…First, the proposed incomplete cooperative game theoretic based MAC (GT-MAC) protocol, improves on the existing wireless sensor MAC protocols by offering significant network performance and lifetime extensions over the existing IEEE 802.15.4\Zigbee standards based WSN protocols. …”
Get full text
Get full text
Thesis -
2
Adaptive medium access control protocol for dynamic medical traffic with quality of service provisioning in wireless body area network
Published 2024“…The proposed ADT-MAC protocol is simulated using Castalia and OMNeT++ to evaluate its performance against state-of-the-art MAC protocols. …”
Get full text
Get full text
Get full text
Article -
3
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Adaptive Medium Access Control (ADT-MAC) Protocol for Dynamic Medical Traffic with Quality of Service (QoS) provisioning in Wireless Body Area Network (WBAN)
Published 2025“…The proposed ADT-MAC protocol is simulated using Castalia in OMNeT++ to evaluate its performance against state-of-the-art MAC protocols. …”
Get full text
Get full text
Thesis -
5
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
Published 2013“…One of the major protocols of our interest is MAC protocol. Different contention-based MAC Protocols for Wireless Sensor Networks (WSNs) have been proposed over the last few years. …”
Get full text
Get full text
Thesis -
6
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
7
The effects of MAC protocols on ad hoc on-demand distance vector (AODV) routing protocol
Published 2009Get full text
Working Paper -
8
-
9
An Energy Efficient Mac Layer Design for Wireless Sensor Network
Published 2008“…The proposed MAC protocol with an extra radio management technique together with backoff management procedure can achieve 70% more energy saving than MAC IEEE 802.15.4 standard. …”
Get full text
Get full text
Thesis -
10
Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal
Published 2020“…Sequel to that the Time Division Multiple Access (TDMA) MAC protocol using a cluster-based topology has been proposed by the research community. …”
Get full text
Get full text
Get full text
Thesis -
11
MAC Protocol for Opportunistic Spectrum Access in Cognitive Radio System
Published 2011“…In this paper, we study MAC protocol design for OSA in Cognitive Radio (CR) ad hoc network under Partially Observable Markov Decision Process (POMDP) algorithm that maximizes achievable throughput for SUs with sufficient protection to PUs. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A novel spiral backoff mechanism for wireless sensor networks MAC protocol in smart grid system
Published 2015Get full text
Get full text
Get full text
Proceeding Paper -
13
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
14
Encryption selection for WLAN IEEE802.11G
Published 2013“…The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. …”
Get full text
Get full text
Thesis -
15
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
16
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Some of these challenges result from the transmission of huge amounts of data in each data sensing period and the complexity of SHM algorithms. Furthermore, in WSNs, the operating system (OS) with its network protocol stack and media access control (MAC) layer protocol play an essential role in managing the scarce resources, data processing and communication. …”
Get full text
Get full text
Thesis -
17
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Secure Socket Layer (SSL) is one of the most widely used security protocols on the Internet. In the current Bulk Data Transfer (BDT) phase in SSL, the server or the client firstly calculates the Message Authentication Code (MAC) of the data using HMAC operation, and then performs the symmetric encryption on the data together with the MAC. …”
Get full text
Get full text
Thesis -
18
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item -
19
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article
