Search Results - data distribution ((process algorithm) OR (((proposed algorithm) OR (protocol algorithm))))
Search alternatives:
- proposed algorithm »
- data distribution »
- process algorithm »
-
1
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…The first step of the proposed protocol involves the development of an energy efficient clustering algorithm which is appropriate for WSN with a sparse density topology. …”
Get full text
Get full text
Thesis -
2
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…The effect of changes in movement (speed) and node density (number of nodes) on the performance of the proposed routing protocols was measured. The performance of ECRP algorithms was compared with other cluster based algorithms. …”
Get full text
Get full text
Thesis -
3
Traffic management algorithms for LEO satellite networks
Published 2016“…The performances of the proposed algorithms are then compared with the previously developed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
4
Performance Analysis of Swarm Intelligence-Based Routing Protocol for Mobile Ad Hoc Network and Wireless Mesh Networks
Published 2009“…Ants’ algorithm belongs to the Swarm Intelligence (SI), which is proposed to find the shortest path. …”
Get full text
Get full text
Thesis -
5
Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm
Published 2012“…Meanwhile in LEACH, the cluster head selection was based on distributed algorithm. Both of these protocols was implemented in network simulator to compare the performance. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
-
7
Encryption method for SCADA security enhancement
Published 2014“…Based on detail SCADA security analysis, the cryptography techniques have been adopted to enhance the security of these critical systems. The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
8
Energy Efficient LEACH (EE-LEACH) Routing Algorithm for Wireless Sensor Networks
Published 2019“…Therefore, this research work proposes an energy-efficient LEACH (EE-LEACH) algorithm to elect CHs based on residual energy, RSSI, and random probability to distribute the load evenly among the CHs. …”
Get full text
Get full text
Thesis -
9
Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach
Published 2022“…In combination, mammogram quantification creates a long-standing focus area. The algorithm proposed must reduce complexity and target data points distributed in iterative, and boost cluster centroid merged into a single updating process to evade the large storage requirement. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution
Published 2014“…Therefore, in this study, a new algorithm called Scheduled-Activity Energy Aware Distributed Clustering (SA-EADC) is proposed. …”
Get full text
Get full text
Thesis -
11
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Some of these challenges result from the transmission of huge amounts of data in each data sensing period and the complexity of SHM algorithms. …”
Get full text
Get full text
Thesis -
12
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
Get full text
Get full text
Thesis -
13
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…The performance of the proposed protocol is compared with SDA, SDAT, SDALFA, EESSDA, SDAACA, and EESDA, which is a widely used protocol in the area of secure data aggregation. …”
Get full text
Get full text
Article -
14
Totally opportunistic routing algorithm for underwater wireless sensor network
Published 2019“…Whereas in NA-TORA, Expected Transmission Count (ETX) and residual energy of a node are considered for data transmission to ensure packet delivery. The suggested data forwarding algorithms are designed to abstain horizontal transmission, to lower end to end delay and improve throughput and energy efficiency. …”
Get full text
Get full text
Thesis -
15
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…A novel and efficient cluster head selection algorithm (ECHSA) is employed to improve the performance of the cluster head (CH) selection process in clustered WSN. …”
Get full text
Get full text
Article -
16
Secure lightweight client for cloud-based E-Health Model
Published 2023“…This algorithm verifies the identity and permission of non-group members to meet the strict privacy protection requirements of EHRs data. …”
Get full text
Get full text
Get full text
Thesis -
17
EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method
Published 2018“…Therefore, in this study a coupled Multivariate Empirical Mode Decomposition (MEMD) with embedded automated artifact remover algorithm and inverse solution method is proposed. …”
Get full text
Get full text
Thesis -
18
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
Published 2012“…The goal of these operations is to update and offer new routing information in order to construct the multiple paths resulting in an increased reliability of the system. Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
Get full text
Get full text
Thesis -
19
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…By applying the proposed algorithm, the throughput of EDCA protocol was increased by 42.9% and it can support 14 voice users rather than 11 in the default EDCA protocol. …”
Get full text
Get full text
Get full text
Thesis -
20
A scheduled activity energy aware distributed clustering algorithm for wireless sensor networks with nonuniform node distribution
Published 2014“…Therefore, in this paper, a new algorithm called scheduled activity EADC (SA-EADC) is proposed. …”
Get full text
Get full text
Get full text
Article
