Search Results - (( based sharing protocol algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- protocol algorithm »
- sharing protocol »
- java implication »
- implication tree »
- tree algorithm »
- based sharing »
-
1
-
2
Encryption selection for WLAN IEEE802.11G
Published 2013“…The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. …”
Get full text
Get full text
Thesis -
3
QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks
Published 2011“…To overcome these problems Quick Transport Control Protocol (QTCP) algorithm based on optimizations of HS-TCP slow start algorithm and Additive Increase and Multiplicative Decrease (AIMD) algorithm have been proposed. …”
Get full text
Get full text
Conference or Workshop Item -
4
Grouping based radio frequency identification anti-collision protocols for dense internet of things application
Published 2022“…This paper analyzes selected grouping-based algorithms. Their underlining principles are discussed including their tag estimation methods. …”
Get full text
Get full text
Article -
5
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…Station-to-Station protocol is a protocol based on the Diffie-Hellman key exchange to prevent the man-in-the-middle attack by inserting authentication. …”
Get full text
Get full text
Student Project -
6
Reduced latency in restricted flooding routing protocol for mobile ad hoc network.
Published 2007“…This paper presents Quadrant-based directional routing protocol (Q-DIR) algorithm that restrict the broadcast region to a quadrant where the destination node and source node are located. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…The proposed authentication protocol has reduced the time required for authentication by 12.5% compared to similar blockchain based authentication protocols. …”
Get full text
Get full text
Thesis -
8
SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges
Published 2024“…The primary objective of this study is to furnish comprehensive information regarding the current SDN-based VANET routing protocols, encompassing intricate details of their underlying mechanisms, forwarding algorithms, and architectural considerations. …”
Get full text
Get full text
Get full text
Article -
9
Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal
Published 2020“…In this thesis, a new approach called enhanced cluster-based TDMA MAC (EC-TMAC) protocol was developed to address these challenges. …”
Get full text
Get full text
Get full text
Thesis -
10
Embedded Ethernet System For Real-Time Communication
Published 2018“…A common Ethernet network functions based on the carrier sense multiple access with collision detection (CSMA/CD) as the media access control (MAC) protocol for data transmission between shared medium. …”
Get full text
Get full text
Monograph -
11
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. This algorithm depends on the adaptability of the concept in the ITSWTCM, I2TSWTCM and M2I2TSWTCM algorithms for affecting the fairness and multiple protocols. …”
Get full text
Get full text
Thesis -
12
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
Get full text
Get full text
Thesis -
13
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
Published 2004“…The “reputation sharing” based on a distributed polling iv algorithm in which the resource requestors can assess the reliability of respective provider before initiating the download. …”
Get full text
Get full text
Thesis -
14
A new routing metric for DYMO protocol on mobile AD HOC network
Published 2013“…This research work proposed a SNR-based routing metric for Dynamic Mobile Ad hoc Network onDemand (DYMO) routing protocol. …”
Get full text
Get full text
Get full text
Thesis -
15
Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol
Published 2009“…A Medium Access Control (MAC) protocol is responsible to sufficiently provide access to a shared medium. …”
Get full text
Get full text
Thesis -
16
SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges
Published 2025“…The primary objective of this study is to furnish comprehensive information regarding the current SDN-based VANET routing protocols, encompassing intricate details of their underlying mechanisms, forwarding algorithms, and architectural considerations. …”
Article -
17
A new public key cryptosystem based on IFS
Published 2010“…To encrypt the plaintext with the receiver's public key we use one of the key agreement protocols to generate a shared private key that used to find the attractor of the IFS. …”
Get full text
Get full text
Get full text
Article -
18
Packet header support using hybrid security approach for securing trivial file transfer protocol in machine to machine applications / Nur Nabila Mohamed
Published 2019“…Here in this thesis study, a feasible hybrid security extension has been incorporated into the protocol combining the Hash-based Message Authentication Code and Diffie Hellman Key Exchange (HMAC-DHKE) to enable key agreement and Advanced Encryption Standard (AES) algorithm to perform data encryption/decryption. …”
Get full text
Get full text
Thesis -
19
Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks
Published 2012“…Therefore, fair sharing with collision avoidance have to be ensured when MAC protocols are designed. …”
Get full text
Get full text
Thesis -
20
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…This newly developed protocol is named Secure and Energy-Efficient Data Aggregation (SEEDA), which is the extension of SDAACA protocol. …”
Get full text
Get full text
Article
