Search Results - (( java implementation using algorithm ) OR ( using leach protocol algorithm ))

Refine Results
  1. 1
  2. 2

    Even-odd scheduling based energy efficient routing for wireless sensor network (WSN) / Muhammad Zafar Iqbal Khan by Khan, Muhammad Zafar Iqbal

    Published 2022
    “…In addition, the network performance has also increased by using the proposed routing algorithm with a throughput of 147.8207 as compared to just 46.0472 with the original LEACH. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Effective routing protocol for wireless sensor networks using CRT-leach algorithm / Kamaldeen Ayodele Raji, Ayisat Wuraola Asaju-Gbolagade and Kazeem Alagbe Gbolagade by Ayodele Raji, Kamaldeen, Asaju-Gbolagade, Ayisat Wuraola, Gbolagade, Kazeem Alagbe

    Published 2021
    “…Chinese Remainder Theorem (CRT)- based packet splitting integrated with Low-Energy Adaptive Clustering Hierarchy (LEACH) algorithm routing protocol was proposed so as to decrease vitality utilization during correspondence and improve message dependability in WSNs. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm by Zeni, Saltihie

    Published 2012
    “…This document is a study about LEACH algorithm where the implementation was done using OMNeT++ network simulator to study the performance of this algorithm in term of network lifetime. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancing the stability of the improved-LEACH routing protocol for WSNs by Al-Zubaidi, Ammar S., Ariffin, Ahmad Alauddin, Al-Qadhi, Abdulrahman K.

    Published 2018
    “…Thus, we were motivated to investigate the Improved LEACH algorithm and to try to solve the stability problem. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A green clustering protocol for mobile sensor network using particle swarm optimization by Latiff, N.M.A., NikAbdMalik, N., Latiff, A.H.A.

    Published 2016
    “…In this paper, we propose a green clustering protocol for mobile sensor networks using particle swarm optimization (PSO) algorithm. …”
    Get full text
    Get full text
    Article
  7. 7

    A green clustering protocol for mobile sensor network using particle swarm optimization by Latiff, N.M.A., NikAbdMalik, N., Latiff, A.H.A.

    Published 2016
    “…In this paper, we propose a green clustering protocol for mobile sensor networks using particle swarm optimization (PSO) algorithm. …”
    Get full text
    Get full text
    Article
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks by Jiang, Cailing

    Published 2019
    “…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Mobile Nodes based Clustering Protocol for Lifetime Optimization in Wireless Sensor Network by Nazir, Babar, Hasbullah, Halabi

    Published 2010
    “…Furthermore, using OMNet-4.0 simulation we compared the performance of proposed protocol with LEACH and EEMC using parameters like energy per packet and throughput. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Performance Analysis of Routing Protocols in Wireless Sensor Networks by Htet, Kyaw Min

    Published 2014
    “…Stable Election Protocol (SEP) routing protocol is also simulated using MATLAB in this project and the evaluation of the performance of the protocol will be discussed.…”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  13. 13

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Energy efficient cluster head distribution in wireless sensor networks by Siew, Zhan Wei

    Published 2013
    “…In general, low energy adaptive cluster hierarchy (LEACH) is one of the most common clustering protocols used to elect the cluster head. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Spectrum aware clustering algorithm based on fuzzy logic for sensor based monitoring application / Noorhayati Mohamed Noor …[et al.] by Mohamed Noor, Noorhayati, Md Din, Norashidah, Kasiran, Zolidah, Khalid, Nor Azimah, Abdullah, Shapina

    Published 2020
    “…To evaluate the proposed clustering algorithm, the performance of sensor networks is compared with CogLEACH, LEACH and CHEF routing protocols. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An energy balanced and nodes aware routing protocol for energy harvesting wireless sensor networks by Mansura, A., Drieberg, M., Aziz, A.A., Bassoo, V., Sarang, S.

    Published 2022
    “…One of the most popular hierarchical routing protocols (RP) is the low-energy adaptive clustering hierarchy (LEACH). …”
    Get full text
    Get full text
    Article
  19. 19

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  20. 20

    Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din by Wan Din, Wan Isni Sofiah

    Published 2016
    “…Hence, this study proposes a new algorithm called Multi-Tier Protocol (MAP). MAP introduced clustering scheme to reduce the energy consumption of wireless sensor network in which, Fuzzy Logic used as tools to select the cluster head and multi-hop communication is used to route the data from the cluster head to the base station. …”
    Get full text
    Get full text
    Thesis