Search Results - (( using mac proposed algorithm ) OR ( java application using algorithm ))
Search alternatives:
- proposed algorithm »
- java application »
- using algorithm »
- mac proposed »
- using mac »
-
1
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Conference or Workshop Item -
4
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
7
An efficient backoff algorithm for IEEE 802.15.4 wireless sensor networks
Published 2014“…In this paper, we propose an efficient backoff algorithm, called EBA-15.4MAC that enhances the performance of slotted CSMA/CA algorithm. …”
Get full text
Get full text
Article -
8
Adaptive medium access control protocol for dynamic medical traffic with quality of service provisioning in wireless body area network
Published 2024“…The proposed ADT-MAC protocol is simulated using Castalia and OMNeT++ to evaluate its performance against state-of-the-art MAC protocols. …”
Get full text
Get full text
Get full text
Article -
9
Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman
Published 2014“…The last part is the development of a metal artifact correction (MAC) algorithm and evaluation of the proposed algorithm in artifacts reduction in CT images. …”
Get full text
Get full text
Thesis -
10
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
Published 2013“…Secondly, to increase the efficiency of EBA-15.4MAC algorithm, we propose a new scheme to resolve the problem of access collision arising from the small number of backoff exponent used by CSMA-CA. …”
Get full text
Get full text
Thesis -
11
An Energy Efficient Mac Layer Design for Wireless Sensor Network
Published 2008“…The proposed MAC protocol has improved the energy consumption around 60% as compared to ABE-MAC. …”
Get full text
Get full text
Thesis -
12
A novel algorithm to prevent man in the middle attack in LAN environment
Published 2010“…To prevent MITM against HTTPS in LAN environment a novel algorithm (DepMAC-IP) is proposed and discussed in detail. …”
Get full text
Get full text
Proceeding Paper -
13
Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal
Published 2020“…Sequel to that the Time Division Multiple Access (TDMA) MAC protocol using a cluster-based topology has been proposed by the research community. …”
Get full text
Get full text
Get full text
Thesis -
14
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A novel spiral backoff mechanism for wireless sensor networks MAC protocol in smart grid system
Published 2015“…Simulation results show that proposed spiral backoff algorithm reduces the end-to-end delay and increases packet delivery ratio (PDR) for the smart grid wireless sensor networks.…”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
17
Adaptive Medium Access Control (ADT-MAC) Protocol for Dynamic Medical Traffic with Quality of Service (QoS) provisioning in Wireless Body Area Network (WBAN)
Published 2025“…The proposed ADT-MAC protocol is simulated using Castalia in OMNeT++ to evaluate its performance against state-of-the-art MAC protocols. …”
Get full text
Get full text
Thesis -
18
Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E
Published 2013“…The acquired results have proven that the proposed algorithms have successfully enhanced the legacy hybrid and the deadline based algorithm.…”
Get full text
Get full text
Thesis -
19
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. Results indicate that the energy consumption is decreased to 25% in a moderately loaded (1pkt/sec) network to a heavily loaded (10pkt/sec) network over the standard of IEEE 802.15.4, EBA-15.4MAC, G-MAC, LEACH and ADAPT protocol. …”
Get full text
Get full text
Thesis -
20
Efficient back-off mechanism for IEEE802.15.4 wireless sensor networks
Published 2015“…In this book, we propose an efficient backoff algorithm, called EBA-15.4MAC that enhances the performance of slotted CSMA/CA algorithm. …”
Get full text
Get full text
Book
