Search Results - (( java application customization algorithm ) OR ( using a protocol algorithm ))
Search alternatives:
- customization algorithm »
- protocol algorithm »
- java application »
- a protocol »
- using a »
-
1
Encryption selection for WLAN IEEE802.11G
Published 2013“…The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. …”
Get full text
Get full text
Thesis -
2
A modification of Shamir's Three-Pass protocol by implementing one-time pad algorithm / Nur Khairunnisa' Kusman, Nurul Hanis Abd Rashid and An Nur Ameera Zamani
Published 2019“…As a result, this study success to develop the algorithm by implemented one-time pad in Shamir's three-pass protocol. …”
Get full text
Get full text
Student Project -
3
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017“…Thus, smart protocol algorithm is developed to replace the previous system. …”
Get full text
Get full text
Monograph -
4
Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm
Published 2006“…In this thesis, we use a fuzzy reasoning algorithm (FRA) as a highly adaptive algorithm to achieve that goal. …”
Get full text
Get full text
Thesis -
5
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
6
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…To overcome this problem a DF protocol relay system model using LDPC code is proposed in this thesis. …”
Get full text
Get full text
Get full text
Thesis -
7
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
Published 2008“…Ad hoc On-Demand Distance Vector (AODV) routing protocol is a reactive protocol in Mobile Ad hoc Network (MANET). …”
Get full text
Get full text
Thesis -
8
Routine insulin sliding scale protocol versus software driven algorithm (star protocol) for blood glucose management of critically ill patients in the ICU: A prospective observatio...
Published 2018“…The objective of the study was to evaluate a specifically designed software driven algorithm for the establishment of tight glycaemic control with lesser risks of potentially harmful hypoglycaemia in critically ill patients in the ICU and to compare the results with the routine glucose management protocol i.e. insulin sliding scale, used by the ICU in UMMC. …”
Get full text
Get full text
Thesis -
9
-
10
Implementation of Station-To-Station (STS) protocol using Elliptic Curve Digital Signature Al Algorithm / Muhammad Faris Fakhri Rozi, Alya Syuhada Ismail and Emylia Suhaimi
Published 2018“…Diffie-Hellman key exchange is a protocol to exchange key between two parties. …”
Get full text
Get full text
Student Project -
11
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…EBCRA solves the issue of redundant re-transmission of RREQ packet and propose a routing algorithm that deal with the broadcast storm problem which is widely practiced in MANET routing protocol. …”
Get full text
Get full text
Get full text
Thesis -
12
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
13
GPS-less Localization Protocol for Underwater Acoustic Networks
Published 2008“…We propose a scheme to perform node discovery, using only one seed node (primary seed) in a known position. …”
Get full text
Get full text
Get full text
Article -
14
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…A discrete event simulator called GridSim and Java programming language is used to simulate the proposed protocol. …”
Get full text
Get full text
Thesis -
15
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…Therefore, in this research work a new algorithm was proposed to enhance the capacity of the EDCA protocol and increase the number of the active voice users. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study
Published 2017“…Various approaches of clustering algorithms are used to optimize the energy of routing protocols. …”
Get full text
Get full text
Get full text
Article -
17
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
18
High Throughput Routing Algorithm Metric for OLSR Routing Protocol in Wireless Mesh Networks
Published 2009“…The network throughput, End-toEnd delay and routing protocol overhead are used as a performance metrics for the comparison. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…To facilitate communication within the network, a routing protocol is used to dis- cover routes between nodes. …”
Get full text
Get full text
Thesis -
20
A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks
Published 2019“…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
Get full text
Get full text
Thesis
