Search Results - (( variable detection method algorithm ) OR ( protocol distributed mobile algorithm ))
Search alternatives:
- variable detection »
- method algorithm »
- mobile algorithm »
- distributed »
-
1
-
2
The new enhancement of OLSR energy-saving system in ADHOC network / Suhazlan Suhaimi
Published 2018“…Overall, the research findings suggest that the proposed new enhancement energy-saving system of the OLSR protocol can help improve the use of battery energy in MANETs through efficient distribution of energy to network nodes. …”
Get full text
Get full text
Thesis -
3
Performance analysis of multipath routing based on source routing
Published 2010Get full text
Working Paper -
4
-
5
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
Get full text
Get full text
Thesis -
6
Evaluation of Clustering and Multi-hop Routing Protocols in Mobile Ad-hoc Sensor Networks
Published 2015“…A HEED (Hybrid, Energy-Efficient, Distributed) is one of the clustering algorithm for sensor networks. …”
Get full text
Get full text
Proceeding -
7
SNR-Based OLSR Routing Protocol for Wireless Mesh Networks
Published 2009“…The performance of the network and the routing protocols has been studied in means of network throughput, End-to-End delay, routing protocol overhead and the mobility. …”
Get full text
Get full text
Thesis -
8
BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
Published 2010“…Although the immune-inspired security protocol (I2MANET) can be applied to many applications that rely on the wireless communications; in this dissertation, it has been specified to secure Mobile Telecommunication Services.…”
Get full text
Get full text
Thesis -
9
Enhanced Mobility Solution In Mobile Ipv6 Network
Published 2008“…The performance of Network Mobility (NEMO) used to manage network mobility does not provide satisfactory result in terms of delay, throughput and session continuity when dealing with multihomed mobile network. …”
Get full text
Get full text
Thesis -
10
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The MANET environment is particularly vulnerable because of the characteristics of mobile ad hoc networks such as open medium, dynamic topology, distributed cooperation, and constrained capability. …”
Get full text
Get full text
Get full text
Thesis -
11
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…Another prominent approach is the Dominant Pruning (DP) which is a distributed dominating set algorithm developed to alleviate the impact of flooding in mobile ad-hoc networks. …”
Get full text
Get full text
Get full text
Thesis -
12
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The results obtained from the simulation study and real data sets indicate that the proposed method possesses high detection power with minimal misclassification error compared to the MRCD and MDP methods. …”
Get full text
Get full text
Thesis -
13
Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links
Published 2014“…The proposed algorithm is integrated with AODV routing protocol to generate a connected dominating set that will be responsible on flooding activity. …”
Get full text
Get full text
Get full text
Article -
14
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
15
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis -
16
Controlling algorithm for energy consumption of radio bandwidth to manage coverage area problem
Published 2024Conference Paper -
17
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
Get full text
Get full text
Thesis -
18
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
19
A real time road marking detection system on large variability road images database
Published 2017“…One of the first embedded system is a lane detection system, which was implemented using road marking detection algorithms with the aim to produce a system that is able to detect various shapes of road markings on the images that are captured under various imaging conditions. …”
Get full text
Get full text
Conference or Workshop Item -
20
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…In contrast to the conventional methods which perform detection from a single image, the stenosis detection algorithm using two images from various view angles to avoid false positive (stenosis overestimated) and false negative (stenosis underestimated). …”
Get full text
Get full text
Thesis
