Scalable MAC Strategy for Emergency Communication Networks
Due to the advancement of wireless communication, the wireless devices increase tremendously in Emergency Communication Networks (ECNs) for various purposes such as search and rescue activities, military applications, digester management, etc. The domain of this network varies from small to large sc...
| Main Authors: | Abbas, Ali. M. H., Rahman, Md. Arafatur, M. Nomani, Kabir, Kamal Z., Zamli |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
American Scientific Publisher
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/19612/ http://umpir.ump.edu.my/id/eprint/19612/1/22.%20Scalable%20MAC%20Strategy%20for%20Emergency%20Communication%20Networks1.pdf |
Similar Items
A scalable hybrid MAC strategy for traffic-differentiated IoT-enabled intra-vehicular networks
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
On mitigating hop-to-hop congestion problem in IoT enabled Intra-Vehicular communication
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
An Expanding Neighbourhood Search Technique for Avalanche Search-and-Rescue Operations using Air Ground Collaborative Wireless Networks
by: Azad, Saiful, et al.
Published: (2018)
by: Azad, Saiful, et al.
Published: (2018)
Enhancing the Awareness Level on Phishing Attacks Among Malaysians: Analysis and Recommendations
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2018)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2018)
Comparative Investigation on CSMA/CA-Based MAC protocols for Scalable Networks
by: Abbas, Ali. M. H., et al.
Published: (2016)
by: Abbas, Ali. M. H., et al.
Published: (2016)
SRPTackle: a semi-automated requirements prioritisation technique for scalable requirements of software system projects
by: Fadhl, Hujainah, et al.
Published: (2021)
by: Fadhl, Hujainah, et al.
Published: (2021)
IoT enable relay network for demand based light intensity controlled seamless highway lighting system
by: Rahman, Md. Arafatur, et al.
Published: (2018)
by: Rahman, Md. Arafatur, et al.
Published: (2018)
An Efficient Image Compression Technique using Tchebichef Bit Allocation
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
Availability Analysis of Shared Backup Path Protection
Under Multiple-link Failure Scenario in WDM Networks
by: M. Nomani, Kabir, et al.
Published: (2014)
by: M. Nomani, Kabir, et al.
Published: (2014)
A robust algorithm for solving nonlinear system of equations using trust-region and line-search techniques
by: Kabir, M. Nomani
Published: (2020)
by: Kabir, M. Nomani
Published: (2020)
Scalable rekeying algorithm in IEEE 802.16e
by: Gilanian Sadeghi, Mohammad Mehdi, et al.
Published: (2011)
by: Gilanian Sadeghi, Mohammad Mehdi, et al.
Published: (2011)
P2R - A Pairwise Testing Strategy Supporting Execution Resumption
by: Helal, Mohammed H.S., et al.
Published: (2012)
by: Helal, Mohammed H.S., et al.
Published: (2012)
A new fuzzy granular technique for the condition monitoring of electrical hotspots based on infrared thermography
by: Ahmed, M. M., et al.
Published: (2018)
by: Ahmed, M. M., et al.
Published: (2018)
A new variable strength t-way strategy based on the cuckoo search algorithm
by: Abdullah, Nasser, et al.
Published: (2019)
by: Abdullah, Nasser, et al.
Published: (2019)
Migrating Birds Optimization based Strategies for Pairwise Testing
by: Hasneeza, L. Zakaria, et al.
Published: (2015)
by: Hasneeza, L. Zakaria, et al.
Published: (2015)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
On the development of a web extension for text authentication on google chrome
by: M. Nomani, Kabir, et al.
Published: (2019)
by: M. Nomani, Kabir, et al.
Published: (2019)
An Orchestrated Survey on T-Way Test Case Generation Strategies Based on Optimization Algorithms
by: Alsewari, Abdulrahman A., et al.
Published: (2014)
by: Alsewari, Abdulrahman A., et al.
Published: (2014)
L-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networks
by: Rahman, Md. Arafatur, et al.
Published: (2018)
by: Rahman, Md. Arafatur, et al.
Published: (2018)
Firefly combinatorial testing strategy
by: Alsewari, Abdulrahman A., et al.
Published: (2019)
by: Alsewari, Abdulrahman A., et al.
Published: (2019)
Epilepsy detection from EEG signals using artificial neural network
by: Sallam, Amer A., et al.
Published: (2019)
by: Sallam, Amer A., et al.
Published: (2019)
A 3D-collaborative wireless network: towards resilient communication for rescuing flood victims
by: Rahman, Md. Arafatur, et al.
Published: (2017)
by: Rahman, Md. Arafatur, et al.
Published: (2017)
Tuning of Cuckoo Search Based Strategy for T-Way Testing
by: Abdullah, Nasser, et al.
Published: (2015)
by: Abdullah, Nasser, et al.
Published: (2015)
An improved Watermarking Technique for Copyright Protection Based on Tchebichef Moments
by: Ernawan, Ferda, et al.
Published: (2019)
by: Ernawan, Ferda, et al.
Published: (2019)
A blind watermarking technique using redundant wavelet transform for copyright protection
by: Ernawan, F., et al.
Published: (2018)
by: Ernawan, F., et al.
Published: (2018)
A blind watermarking using redundant wavelet transform for copyright protection
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Scalable technique to discover items support from trie data structure
by: Noraziah, Ahmad, et al.
Published: (2012)
by: Noraziah, Ahmad, et al.
Published: (2012)
A review of artificial intelligence strategies in covering array construction
by: Sughan Nair, Prabhakaran, et al.
Published: (2016)
by: Sughan Nair, Prabhakaran, et al.
Published: (2016)
Variable-Strength Interaction for T-Way Test Generation Strategy
by: Syahrul A. C., Abdullah, et al.
Published: (2013)
by: Syahrul A. C., Abdullah, et al.
Published: (2013)
An adaptive flower pollination algorithm for minimizing software testing redundancy
by: M. N., Kabir, et al.
Published: (2017)
by: M. N., Kabir, et al.
Published: (2017)
Assessing optimization based strategies for t-way test suite generation: The case for flower-based strategy
by: Abdullah, Nasser, et al.
Published: (2016)
by: Abdullah, Nasser, et al.
Published: (2016)
Greedy Interaction Elements Coverage Analysis for AI-Based T-Way Strategies
by: Kamal Z., Zamli, et al.
Published: (2013)
by: Kamal Z., Zamli, et al.
Published: (2013)
Software Based Scalable Packet
Capture Mechanism To Reduce
Packet Loss
by: Alias, Syazwina
Published: (2019)
by: Alias, Syazwina
Published: (2019)
T-Way Testing Strategies: A Critical Survey and Analysis
by: Kamal Z., Zamli, et al.
Published: (2013)
by: Kamal Z., Zamli, et al.
Published: (2013)
A parameter free choice function based hyper-heuristic strategy for pairwise test generation
by: Fakhrud, Din, et al.
Published: (2017)
by: Fakhrud, Din, et al.
Published: (2017)
Late Acceptance Hill Climbing Based Strategy for Test Redundancy Reduction and Prioritization
by: Rohani, Abu Bakar, et al.
Published: (2015)
by: Rohani, Abu Bakar, et al.
Published: (2015)
An Interaction Strategy for Testing Software Product Lines using the Bat-inspired Algorithm
by: Alsariera, Yazan A., et al.
Published: (2015)
by: Alsariera, Yazan A., et al.
Published: (2015)
A Unified Strategy for Sequence and Sequence-less T-way Test Suite Generation
by: Abdullah, Nasser, et al.
Published: (2016)
by: Abdullah, Nasser, et al.
Published: (2016)
Survey on input output relation based combination test data generation strategies
by: Alsewari, Abdulrahman A., et al.
Published: (2015)
by: Alsewari, Abdulrahman A., et al.
Published: (2015)
Comparative Benchmarking Of Constraints T-Way Test Generation Strategy Based On Late Acceptance Hill Climbing Algorithm
by: Kamal Z., Zamli, et al.
Published: (2015)
by: Kamal Z., Zamli, et al.
Published: (2015)
Similar Items
-
A scalable hybrid MAC strategy for traffic-differentiated IoT-enabled intra-vehicular networks
by: Rahman, Md. Arafatur, et al.
Published: (2020) -
On mitigating hop-to-hop congestion problem in IoT enabled Intra-Vehicular communication
by: Rahman, Md. Arafatur, et al.
Published: (2015) -
An Expanding Neighbourhood Search Technique for Avalanche Search-and-Rescue Operations using Air Ground Collaborative Wireless Networks
by: Azad, Saiful, et al.
Published: (2018) -
Enhancing the Awareness Level on Phishing Attacks Among Malaysians: Analysis and Recommendations
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2018) -
Comparative Investigation on CSMA/CA-Based MAC protocols for Scalable Networks
by: Abbas, Ali. M. H., et al.
Published: (2016)