Search Results - (( _ construction protocol algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…However, in a larger system such as Data Grid, the existing replica control protocols require bigger number of replicas to construct read and write quorums. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources by Al‐Sharafi, Ali Mohammed Ali

    Published 2008
    “…This thesis proposes some techniques to enhance the AMTree protocol. First we propose two algorithms to improve the handoff process in AMTree protocol. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata by Mohamad Hata, Mohsen

    Published 2019
    “…For achieving plausible deniability this research proposed a new protocol that embeds two layers of techniques. This new approach of constructing two layers of deniability techniques is done in a manner of defining a protocol to embed and implementing them. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…EBCRA solves the issue of redundant re-transmission of RREQ packet and propose a routing algorithm that deal with the broadcast storm problem which is widely practiced in MANET routing protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol by Addie Irawan, Hashim, R. Badlishah, Ahmad

    Published 2006
    “…This article describes the study of improving the proposed protocol called Receiverinitiated WDM Tree Construction (R-IWDMTC) protocol. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9
  10. 10

    Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology by Lee, Feng Wei

    Published 2022
    “…Last but not least, comprehensive security of the constructed protocol is provided and the protocol is secured under the CK model.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol by Al-Alak, Saif M. Kh.

    Published 2014
    “…The Wireless Sensor Network (WSN) is defined to connect the sensors by using a set of protocols. The IEEE 802.15.4 standard includes the required protocols to construct a WSN. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Strategies for effective value management practice in construction industry by Zulhkiple, A. Bakar

    Published 2017
    “…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links by Waheed, Bassam M. S., Mohd Ali, Borhanuddin, Khatun, Sabira, Mohd Sidek, Roslina

    Published 2014
    “…The proposed algorithm is integrated with AODV routing protocol to generate a connected dominating set that will be responsible on flooding activity. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A reliable unicast routing protocol for mobile ad hoc network by Sargolzaey, Hadi

    Published 2013
    “…Simulation results show that by using this protocol the lowest number of route reconstructions is achieved in comparison with the other related protocols and we have 79% to 86% reductions in ute reconstruction number in different network conditions. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…In addition, at the end we will give some future directions, which can be helpful in order to construct the algorithms for such environments.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…In addition, at the end we will give some future directions, which can be helpful in order to construct the algorithms for such environments.…”
    Get full text
    Get full text
    Conference or Workshop Item