Search Results - (( based sharing protocol algorithm ) OR ( java implication tree algorithm ))

Refine Results
  1. 1
  2. 2

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. …”
    Get full text
    Get full text
    Thesis
  3. 3

    QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks by Qureshi, Barkatullah, Othman, Mohamed, K. Subramaniam, Shamala, Abdul Hamid, Nor Asilah Wati

    Published 2011
    “…To overcome these problems Quick Transport Control Protocol (QTCP) algorithm based on optimizations of HS-TCP slow start algorithm and Additive Increase and Multiplicative Decrease (AIMD) algorithm have been proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Grouping based radio frequency identification anti-collision protocols for dense internet of things application by Umelo, Nnamdi H., Noordin, Nor K., A. Rasid, Mohd Fadlee, Geok, Tan K., Hashim, Fazirulhisyam

    Published 2022
    “…This paper analyzes selected grouping-based algorithms. Their underlining principles are discussed including their tag estimation methods. …”
    Get full text
    Get full text
    Article
  5. 5

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…Station-to-Station protocol is a protocol based on the Diffie-Hellman key exchange to prevent the man-in-the-middle attack by inserting authentication. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Reduced latency in restricted flooding routing protocol for mobile ad hoc network. by A. Latif, Liza, Ali, A., Fisal, Norsheila

    Published 2007
    “…This paper presents Quadrant-based directional routing protocol (Q-DIR) algorithm that restrict the broadcast region to a quadrant where the destination node and source node are located. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Blockchain based security framework for device authentication and data communication in decentralized IoT network by Alahmed, Mahmoud Tayseer

    Published 2023
    “…The proposed authentication protocol has reduced the time required for authentication by 12.5% compared to similar blockchain based authentication protocols. …”
    Get full text
    Get full text
    Thesis
  8. 8

    SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges by Hussein, Nehad Hameed, Koh, Siaw Paw, Yaw, Chong Tak, Tiong, Sieh Kiong, Benedict, F., Yusaf, Talal, K., Kadirgama, Tan, Chung Hong

    Published 2024
    “…The primary objective of this study is to furnish comprehensive information regarding the current SDN-based VANET routing protocols, encompassing intricate details of their underlying mechanisms, forwarding algorithms, and architectural considerations. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal by Abubakar Bello , Tambawal

    Published 2020
    “…In this thesis, a new approach called enhanced cluster-based TDMA MAC (EC-TMAC) protocol was developed to address these challenges. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Embedded Ethernet System For Real-Time Communication by Thiagarajan, Durgesh

    Published 2018
    “…A common Ethernet network functions based on the carrier sense multiple access with collision detection (CSMA/CD) as the media access control (MAC) protocol for data transmission between shared medium. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. This algorithm depends on the adaptability of the concept in the ITSWTCM, I2TSWTCM and M2I2TSWTCM algorithms for affecting the fairness and multiple protocols. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Relay suitability based routing protocol for video streaming in vehicular ad-hoc network by Omar Abdulmaged, Hammood

    Published 2022
    “…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems by Sinnanaidu, Subba Rao

    Published 2004
    “…The “reputation sharingbased on a distributed polling iv algorithm in which the resource requestors can assess the reliability of respective provider before initiating the download. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A new routing metric for DYMO protocol on mobile AD HOC network by Salleh, Noor Amani

    Published 2013
    “…This research work proposed a SNR-based routing metric for Dynamic Mobile Ad hoc Network onDemand (DYMO) routing protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol by Pirborj, Nesae Mouzehkesh

    Published 2009
    “…A Medium Access Control (MAC) protocol is responsible to sufficiently provide access to a shared medium. …”
    Get full text
    Get full text
    Thesis
  16. 16

    SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges by Hussein N.H., Koh S.P., Yaw C.T., Tiong S.K., Benedict F., Yusaf T., Kadirgama K., Hong T.C.

    Published 2025
    “…The primary objective of this study is to furnish comprehensive information regarding the current SDN-based VANET routing protocols, encompassing intricate details of their underlying mechanisms, forwarding algorithms, and architectural considerations. …”
    Article
  17. 17

    A new public key cryptosystem based on IFS by Mohammed G. Al-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2010
    “…To encrypt the plaintext with the receiver's public key we use one of the key agreement protocols to generate a shared private key that used to find the attractor of the IFS. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Packet header support using hybrid security approach for securing trivial file transfer protocol in machine to machine applications / Nur Nabila Mohamed by Mohamed, Nur Nabila

    Published 2019
    “…Here in this thesis study, a feasible hybrid security extension has been incorporated into the protocol combining the Hash-based Message Authentication Code and Diffie Hellman Key Exchange (HMAC-DHKE) to enable key agreement and Advanced Encryption Standard (AES) algorithm to perform data encryption/decryption. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…Therefore, fair sharing with collision avoidance have to be ensured when MAC protocols are designed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model by Jasim, Ahmed Abdulhadi, Idris, Mohd Yamani Idna, Azzuhri, Saaidal Razalli, Issa, Noor Riyadh, Noor, Noorzaily Mohamed, Kakarla, Jagadeesh, Amiri, Iraj Sadegh

    Published 2019
    “…This newly developed protocol is named Secure and Energy-Efficient Data Aggregation (SEEDA), which is the extension of SDAACA protocol. …”
    Get full text
    Get full text
    Article