Search Results - (( java implementation bat algorithm ) OR ( using data protocol algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…In the first scenario, the data was tested with encryption protocols and for the second scenario, the data was tested with encryption algorithms and also encryption protocols. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…In Data Grid, data replication is a widely used technique for managing data, where exact copies of data or replicas are created and stored at many distributed sites. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Routine insulin sliding scale protocol versus software driven algorithm (star protocol) for blood glucose management of critically ill patients in the ICU: A prospective observatio... by Tan, Ru Yi

    Published 2018
    “…The data collected was subsequently simulated with the software driven algorithm (STAR protocol) and results were analysed to determine if it was better at maintaining blood glucose levels within set targets of 6-10 mmol/L. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…Enhanced Distributed Channel Access (EDCA) protocol is used to support quality of service (QoS). …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…This thesis describes an analysis on the effect of these challenges on the perceived video quality over MANET which is considered the important network in many studies. An enhanced algorithm has been suggested to improve the video quality using routing algorithm which is used to transfer the data packets with minimum number of errors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    MCRP: multiple chain routing protocol for energy efficiency in homogeneous wireless sensor networks by Kareem, Husam, Hashim, Shaiful Jahari, Sali, Aduwati, Taha, Omer W., Kazim, Issraa J., Shukri, Shaimaa

    Published 2019
    “…There are many solutions that can be used to overcome the energy limitation issue and one of the main solutions is the routing algorithm used in the network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing by Rahman, Gohar

    Published 2023
    “…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing by Rahman, Gohar

    Published 2023
    “…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Internet Telephony Transport Protocol (ITTP): An Efficient Transport Protocol For Voip Applications by Abu-Alhaj, Mosleh Mohammad

    Published 2011
    “…However, the RTP/UDP protocols are used to transfer all types of real-time multimedia applications data such as video conferencing, multimedia streaming, voice data, and so on. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Reliable low power network protocol in IoT for agriculture field by Wong, Christopher Jin Soon

    Published 2024
    “…The data link layer protocol handles the Medium Access Control (MAC) of the mesh network efficiently using algorithms based on the Scheduling sub-cycle of the Fast, Adaptive, and Energy-efficient Multi-channel-multi-path (FAEM) protocol by Liew et al. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15
  16. 16
  17. 17

    Even-odd scheduling based energy efficient routing for wireless sensor network (WSN) / Muhammad Zafar Iqbal Khan by Khan, Muhammad Zafar Iqbal

    Published 2022
    “…In future, the proposed algorithm can be further enhanced with data aggregation efficiency, probabilistically election of cluster heads, and other energy-consuming parameters.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions by Abbas O.K., Abdullah F., Radzi N.A.M., Salman A.D., Abdulkadir S.J.

    Published 2025
    “…The survey concluded that protocol designers must focus on the development and implementation of fire-adaptive routing protocols, incorporating optimal fault tolerance routing algorithms that adapt seamlessly to unforeseen environmental changes, including fire incidents. …”
    Article
  19. 19

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article