Search Results - (( protocol distributed mobile algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    The new enhancement of OLSR energy-saving system in ADHOC network / Suhazlan Suhaimi by Suhaimi, Suhazlan

    Published 2018
    “…Overall, the research findings suggest that the proposed new enhancement energy-saving system of the OLSR protocol can help improve the use of battery energy in MANETs through efficient distribution of energy to network nodes. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  8. 8

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Evaluation of Clustering and Multi-hop Routing Protocols in Mobile Ad-hoc Sensor Networks by Jambli, M.N., Hendrick, A., Julaihi, A.A., Abdullah, J., Suhaili, S.M.

    Published 2015
    “…A HEED (Hybrid, Energy-Efficient, Distributed) is one of the clustering algorithm for sensor networks. …”
    Get full text
    Get full text
    Proceeding
  10. 10

    SNR-Based OLSR Routing Protocol for Wireless Mesh Networks by Elobaid, Mohamed Elshaikh

    Published 2009
    “…The performance of the network and the routing protocols has been studied in means of network throughput, End-to-End delay, routing protocol overhead and the mobility. …”
    Get full text
    Get full text
    Thesis
  11. 11

    BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS by Yasir Abdelgadir , Mohamed, Azween, Abdullah

    Published 2010
    “…Although the immune-inspired security protocol (I2MANET) can be applied to many applications that rely on the wireless communications; in this dissertation, it has been specified to secure Mobile Telecommunication Services.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhanced Mobility Solution In Mobile Ipv6 Network by David, Adeniji Oluwashola

    Published 2008
    “…The performance of Network Mobility (NEMO) used to manage network mobility does not provide satisfactory result in terms of delay, throughput and session continuity when dealing with multihomed mobile network. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…The MANET environment is particularly vulnerable because of the characteristics of mobile ad hoc networks such as open medium, dynamic topology, distributed cooperation, and constrained capability. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…Another prominent approach is the Dominant Pruning (DP) which is a distributed dominating set algorithm developed to alleviate the impact of flooding in mobile ad-hoc networks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  16. 16

    Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links by Waheed, Bassam M. S., Mohd Ali, Borhanuddin, Khatun, Sabira, Mohd Sidek, Roslina

    Published 2014
    “…The proposed algorithm is integrated with AODV routing protocol to generate a connected dominating set that will be responsible on flooding activity. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20