Search Results - (( using action protocol algorithm ) OR ( java application pollination algorithm ))

Refine Results
  1. 1

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    System design for urban vehicle two-way connection monitoring system / Muhammad Haiqal Amiruddin by Amiruddin, Muhammad Haiqal

    Published 2015
    “…Meanwhile the communication module will communicate between the sensing module and the action module based on two approaches: SMS protocol and TCP/IP protocol. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Optimization of process allocation causes to decrease the network traffic and fairer allocation, and therefore,optimization of fault-tolerance. The new protocol is simulated with using the OPNET and the MATLAB software. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…The designated algorithm is tested with Multi-Protocol Label Switching (MPLS) protocol using Network Simulator 3 (NS-3) as a simulation platform. …”
    text::Thesis
  8. 8
  9. 9

    Dynamic Traffic-Light Phase Plan Protocol (DT3P) by Abbas, Maythem K., Karsiti , Mohd Noh, Napiah, Madzlan, Samir, B. B.

    Published 2011
    “…We are proposing a system design with its protocol and set of algorithms to help balancing the road traffic load and make the driving on highways and urban cities roads more comfort. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11
  12. 12

    Brain Machine Interface Controlled Robot Chair by Hema Chengalvarayan, Radhakrishnamurthy

    Published 2010
    “…The BMI controls the joystick of the robot chair using a shared control algorithm. Real-time experiments are also presented using 10 trained and 5 untrained subjects to validate the applicability of the brain machine interface. …”
    Get full text
    Thesis
  13. 13

    Traffic Light Control via VANET System Architecture by Brahim Belhaouari Samir, BBS, Mohammad Noh K., MNL

    Published 2011
    “…We are proposing a system design with its protocol and set of algorithms to help balancing the road traffic load and make the driving on highways and urban cities roads more comfort. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Improving the security of mobile IPV6 signalling using KECCAK / SHA-3 by Supriyanto Praptodiyono, Teguh Firmansyah, Raja Kumar Murugesan, Mudrik Alaydrus, Randy Aprilia, Leau, Yu-Beng

    Published 2021
    “…The conventional IPsec uses Keyed-Hash Message Authentication Code-Secure Hash Algorithm-1 (HMAC-SHA-1) to authenticate signalling messages. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Lightweight ontology architecture for QoS aware service discovery and semantic CoAP data management in heterogeneous IoT environment by Sukhavasi, Suman, Perumal, Thinagaran, Mustapha, Norwati, Yaakob, Razali

    Published 2026
    “…User requests, transmitted via the Constrained Application Protocol (CoAP), are semantically enriched and matched to QoS parameters using Dynamic Shannon Entropy optimized with the Salp Swarm Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks via Game Theory by Olanrewaju, Rashidah Funke, Hassan Abdalla Hashim, Aisha, Yusoff, Siti Hajar

    Published 2018
    “…The proposed study performs statistical analysis and presents a mathematical model to mimic the multi-stage game between regular and malicious node using Game Theory. Furthermore, it does not use any complex cryptographic protocols that tend to increase network overhead. …”
    Get full text
    Get full text
    Monograph