Search Results - (( using mac protocol algorithm ) OR ( java application using algorithm ))
Search alternatives:
- protocol algorithm »
- java application »
- using algorithm »
- using mac »
-
1
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…First, the proposed incomplete cooperative game theoretic based MAC (GT-MAC) protocol, improves on the existing wireless sensor MAC protocols by offering significant network performance and lifetime extensions over the existing IEEE 802.15.4\Zigbee standards based WSN protocols. …”
Get full text
Get full text
Thesis -
2
Adaptive medium access control protocol for dynamic medical traffic with quality of service provisioning in wireless body area network
Published 2024“…The proposed ADT-MAC protocol is simulated using Castalia and OMNeT++ to evaluate its performance against state-of-the-art MAC protocols. …”
Get full text
Get full text
Get full text
Article -
3
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
Published 2013“…One of the major protocols of our interest is MAC protocol. Different contention-based MAC Protocols for Wireless Sensor Networks (WSNs) have been proposed over the last few years. …”
Get full text
Get full text
Thesis -
4
The effects of MAC protocols on ad hoc on-demand distance vector (AODV) routing protocol
Published 2009Get full text
Working Paper -
5
-
6
An Energy Efficient Mac Layer Design for Wireless Sensor Network
Published 2008“…The proposed MAC protocol with an extra radio management technique together with backoff management procedure can achieve 70% more energy saving than MAC IEEE 802.15.4 standard. …”
Get full text
Get full text
Thesis -
7
Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal
Published 2020“…Sequel to that the Time Division Multiple Access (TDMA) MAC protocol using a cluster-based topology has been proposed by the research community. …”
Get full text
Get full text
Get full text
Thesis -
8
MAC Protocol for Opportunistic Spectrum Access in Cognitive Radio System
Published 2011“…In this paper, we study MAC protocol design for OSA in Cognitive Radio (CR) ad hoc network under Partially Observable Markov Decision Process (POMDP) algorithm that maximizes achievable throughput for SUs with sufficient protection to PUs. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A novel spiral backoff mechanism for wireless sensor networks MAC protocol in smart grid system
Published 2015Get full text
Get full text
Get full text
Proceeding Paper -
10
Encryption selection for WLAN IEEE802.11G
Published 2013“…The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. …”
Get full text
Get full text
Thesis -
11
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Some of these challenges result from the transmission of huge amounts of data in each data sensing period and the complexity of SHM algorithms. Furthermore, in WSNs, the operating system (OS) with its network protocol stack and media access control (MAC) layer protocol play an essential role in managing the scarce resources, data processing and communication. …”
Get full text
Get full text
Thesis -
12
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Secure Socket Layer (SSL) is one of the most widely used security protocols on the Internet. In the current Bulk Data Transfer (BDT) phase in SSL, the server or the client firstly calculates the Message Authentication Code (MAC) of the data using HMAC operation, and then performs the symmetric encryption on the data together with the MAC. …”
Get full text
Get full text
Thesis -
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Embedded Ethernet System For Real-Time Communication
Published 2018“…Moreover, a backoff algorithm is the part of MAC protocol which implements for rescheduling the transmission of a packet after a collision occurs. …”
Get full text
Get full text
Monograph -
16
Increase throughput of CCM security mode using MKP
Published 2014“…A security protocol is used to ensure the messages transferred over a network free from attack. …”
Get full text
Get full text
Article -
17
Software Development For Conversion Of Ip To Wireless Atm (Watm)
Published 2002“…In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. …”
Get full text
Get full text
Thesis -
18
An efficient backoff algorithm for IEEE 802.15.4 wireless sensor networks
Published 2014“…In this paper, we propose an efficient backoff algorithm, called EBA-15.4MAC that enhances the performance of slotted CSMA/CA algorithm. …”
Get full text
Get full text
Article -
19
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
20
Efficient back-off mechanism for IEEE802.15.4 wireless sensor networks
Published 2015“…In this book, we propose an efficient backoff algorithm, called EBA-15.4MAC that enhances the performance of slotted CSMA/CA algorithm. …”
Get full text
Get full text
Book
