Search Results - data distribution ((process algorithm) OR (((protocol algorithm) OR (proposed algorithm))))

Refine Results
  1. 1

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The first step of the proposed protocol involves the development of an energy efficient clustering algorithm which is appropriate for WSN with a sparse density topology. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…The effect of changes in movement (speed) and node density (number of nodes) on the performance of the proposed routing protocols was measured. The performance of ECRP algorithms was compared with other cluster based algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…The performances of the proposed algorithms are then compared with the previously developed algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Performance Analysis of Swarm Intelligence-Based Routing Protocol for Mobile Ad Hoc Network and Wireless Mesh Networks by Moghanjoughi, Ayyoub Akbari

    Published 2009
    “…Ants’ algorithm belongs to the Swarm Intelligence (SI), which is proposed to find the shortest path. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm by Zeni, Saltihie

    Published 2012
    “…Meanwhile in LEACH, the cluster head selection was based on distributed algorithm. Both of these protocols was implemented in network simulator to compare the performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…Based on detail SCADA security analysis, the cryptography techniques have been adopted to enhance the security of these critical systems. The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Energy Efficient LEACH (EE-LEACH) Routing Algorithm for Wireless Sensor Networks by Pillay, Kosheila Sundram

    Published 2019
    “…Therefore, this research work proposes an energy-efficient LEACH (EE-LEACH) algorithm to elect CHs based on residual energy, RSSI, and random probability to distribute the load evenly among the CHs. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach by Othman, Khairulnizam

    Published 2022
    “…In combination, mammogram quantification creates a long-standing focus area. The algorithm proposed must reduce complexity and target data points distributed in iterative, and boost cluster centroid merged into a single updating process to evade the large storage requirement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution by Nokhanji, Nooshin

    Published 2014
    “…Therefore, in this study, a new algorithm called Scheduled-Activity Energy Aware Distributed Clustering (SA-EADC) is proposed. …”
    Get full text
    Get full text
    Thesis
  11. 11

    High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring by Al-Mekhlafi, Mohamed Abdulkarem Taher

    Published 2021
    “…Some of these challenges result from the transmission of huge amounts of data in each data sensing period and the complexity of SHM algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model by Jasim, Ahmed Abdulhadi, Idris, Mohd Yamani Idna, Azzuhri, Saaidal Razalli, Issa, Noor Riyadh, Noor, Noorzaily Mohamed, Kakarla, Jagadeesh, Amiri, Iraj Sadegh

    Published 2019
    “…The performance of the proposed protocol is compared with SDA, SDAT, SDALFA, EESSDA, SDAACA, and EESDA, which is a widely used protocol in the area of secure data aggregation. …”
    Get full text
    Get full text
    Article
  14. 14

    Totally opportunistic routing algorithm for underwater wireless sensor network by Rahman, Ziaur

    Published 2019
    “…Whereas in NA-TORA, Expected Transmission Count (ETX) and residual energy of a node are considered for data transmission to ensure packet delivery. The suggested data forwarding algorithms are designed to abstain horizontal transmission, to lower end to end delay and improve throughput and energy efficiency. …”
    Get full text
    Get full text
    Thesis
  15. 15

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…A novel and efficient cluster head selection algorithm (ECHSA) is employed to improve the performance of the cluster head (CH) selection process in clustered WSN. …”
    Get full text
    Get full text
    Article
  16. 16

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…This algorithm verifies the identity and permission of non-group members to meet the strict privacy protection requirements of EHRs data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method by Khosropanah, Pegah

    Published 2018
    “…Therefore, in this study a coupled Multivariate Empirical Mode Decomposition (MEMD) with embedded automated artifact remover algorithm and inverse solution method is proposed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…The goal of these operations is to update and offer new routing information in order to construct the multiple paths resulting in an increased reliability of the system. Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…By applying the proposed algorithm, the throughput of EDCA protocol was increased by 42.9% and it can support 14 voice users rather than 11 in the default EDCA protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20