Search Results - (( messaging application path algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- messaging application »
- application path »
- java implication »
- implication tree »
- path algorithm »
- tree algorithm »
-
1
-
2
A Modified Route Discovery Approach For Dynamic Source Routing (DSR) Protocol In Mobile Ad-Hoc Networks
Published 2017“…The DSR (Dynamic Source Routing) routing protocol algorithm is one of these routing protocols which consist of two main stages; route discovery and maintenance, where the route discovery algorithm operates based on blind flooding of request messages. blind flooding is considered as the most well known broadcasting mechanism , it is inefficient in terms of communication and resource utilization, which causing increasing the probability of collisions, repeating send several copies of the same message, as well as increasing the delay. …”
Get full text
Get full text
Get full text
Article -
3
Adaptable decentralized orchestration engine for block structured non-transactional workflow in service oriented architecture.
Published 2011“…The latter considers the frequent-path adaptability and both of them together satisfy both frequent-path and proportionalfragment adaptability aspects; v) A Fuzzy Decentralization Decision Making algorithm (FDDM) is presented based on the fuzzy logic to choose a suitable method of decentralization that satisfies the three adaptability aspects frequent-path,proportional- fragment and available-bandwidth; and, vi) an algorithm is introduced for wiring of dynamic fragments. …”
Get full text
Get full text
Thesis -
4
Solving traveling salesman problem on cluster compute nodes
Published 2009Get full text
Get full text
Article -
5
Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing
Published 2012“…This research focuses on providing the IP layer with both the service location information and message level knowledge to minimise the standoff between the ISPs and P2P based DSD applications. …”
Get full text
Get full text
Thesis -
6
Multipath routing protocol based on cross-layer approach for MANET
Published 2017“…The Route Discovery Delay, Number of RREQ Messages, Number of RREP Messages, End-to-End Delay, Packet Delivery Ratio (PDR), and Throughput were selected as the main performance evaluation metrics. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Hash functions are one of the cryptographies that can be used in both security design applications and protocol suites. A few distinct applications of hash algorithms are digital signatures, digital time stamping and the message integrity verification. …”
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
Steganography based on utilizing more surrounding pixels
Published 2010“…The purpose of this study is to investigate the application of least significant bit insertion method (LSB) in concealing a definite amount of message bits inside a typical media such as an 8-bit gray-scale image and develop an alternative model structure selection algorithm based on considering more surrounding pixels in order to compute the best capacity value for each target pixel. …”
Get full text
Get full text
Thesis -
12
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Hash functions are one of the cryptographies that can be used in both security design applications and protocol suites. A few distinct applications of hash algorithms are digital signatures, digital time stamping and the message integrity verification. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
An Efficient Route Selection Based on AODV Algorithm for VANET
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
14
An Efficient Route Selection based on AODV Algorithm for VANET
Published 2016Get full text
Get full text
Get full text
Article -
15
Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network
Published 2020“…The proposed Quality of Path QoP metric is incorporated into the modified relay selection algorithm, which improves the efficiency of relay selection mechanism to find optimal path with high link quality. …”
Get full text
Get full text
Thesis -
16
-
17
Enhanced Mobility Solution In Mobile Ipv6 Network
Published 2008“…The interface selection algorithm was based on NEMO implementation structure using a technique of mutihoming which was extended to MIPv6 concepts The outcome of this research work are: a designed policy protocol for policy messages communication between the Mobile Router and the Home Agent, the framework is simulated using Network Simulator (NS2) with an extension of mobiwan, the result shows the end to end delay, average end to end delay, overhead, optimal routing path, average inter-packet latency and throughput of the developed system. …”
Get full text
Get full text
Thesis -
18
Image orientation watermarking technique for copyright protection
Published 2016“…Watermarking imitates steganography in information hiding but with alternative priorities, it focuses on the cover and not on the hidden message. The use of watermarking has still not achieved a meaningful level of reliability in copyright protection applications as to be able to resolve infringement claims in the courts. …”
Get full text
Get full text
Get full text
Thesis
