Search Results - data distribution ((((process algorithm) OR (drops algorithm))) OR (protocol algorithm))*
Search alternatives:
- protocol algorithm »
- data distribution »
- process algorithm »
-
1
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…The effect of changes in movement (speed) and node density (number of nodes) on the performance of the proposed routing protocols was measured. The performance of ECRP algorithms was compared with other cluster based algorithms. …”
Get full text
Get full text
Thesis -
2
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
Published 2012“…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
Get full text
Get full text
Thesis -
3
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. Policing process drops traffic while shaping process delay traffic to the next time transmissions. …”
Get full text
Get full text
Article -
4
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
Get full text
Get full text
Thesis -
5
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. Policing process drops traffic while shaping process delay traffic to the next time transmissions. …”
Get full text
Get full text
Thesis -
6
-
7
Performance Analysis of Swarm Intelligence-Based Routing Protocol for Mobile Ad Hoc Network and Wireless Mesh Networks
Published 2009“…The results show that the IANRA routing algorithm improved the data packet delivery ratio for both WMNs and MANET. …”
Get full text
Get full text
Thesis -
8
Encryption method for SCADA security enhancement
Published 2014“…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
9
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Some of these challenges result from the transmission of huge amounts of data in each data sensing period and the complexity of SHM algorithms. …”
Get full text
Get full text
Thesis -
10
Traffic management algorithms for LEO satellite networks
Published 2016“…The performances of the proposed algorithms are then compared with the previously developed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
11
Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm
Published 2012“…Meanwhile in LEACH, the cluster head selection was based on distributed algorithm. Both of these protocols was implemented in network simulator to compare the performance. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach
Published 2022“…In combination, mammogram quantification creates a long-standing focus area. The algorithm proposed must reduce complexity and target data points distributed in iterative, and boost cluster centroid merged into a single updating process to evade the large storage requirement. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Deployment of new dynamic cryptography buffer for SCADA security enhancement
Published 2014“…The DCB contains several fields/sub-fields which have been used during implementation of cryptography algorithm and other information ( or detail) related with protocol security. …”
Get full text
Get full text
Get full text
Article -
14
Energy Efficient LEACH (EE-LEACH) Routing Algorithm for Wireless Sensor Networks
Published 2019“…Therefore, this research work proposes an energy-efficient LEACH (EE-LEACH) algorithm to elect CHs based on residual energy, RSSI, and random probability to distribute the load evenly among the CHs. …”
Get full text
Get full text
Thesis -
15
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…Therefore, reducing the response time and overhead will enhance the communication process. To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. …”
Get full text
Get full text
Get full text
Thesis -
16
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…This newly developed protocol is named Secure and Energy-Efficient Data Aggregation (SEEDA), which is the extension of SDAACA protocol. …”
Get full text
Get full text
Article -
17
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…The proposed multi-trust approach is used to analyze the credibility of sensitive monitored data. A novel and efficient cluster head selection algorithm (ECHSA) is employed to improve the performance of the cluster head (CH) selection process in clustered WSN. …”
Get full text
Get full text
Article -
18
Routing Hole Mitigation by Edge based Multi-Hop Cluster-based Routing Protocol in Wireless Sensor Network
Published 2019“…To reduce the routing hole problem in WSNs, an energy-efficient least-edge computation (ELEC) cluster-based algorithm is proposed, which consider the value of edge count, link cost and energy level in selecting the next hope neighbor in data transmission. …”
Get full text
Get full text
Get full text
Article -
19
Totally opportunistic routing algorithm for underwater wireless sensor network
Published 2019“…Whereas in NA-TORA, Expected Transmission Count (ETX) and residual energy of a node are considered for data transmission to ensure packet delivery. The suggested data forwarding algorithms are designed to abstain horizontal transmission, to lower end to end delay and improve throughput and energy efficiency. …”
Get full text
Get full text
Thesis -
20
