Search Results - (( problem sharing protocol algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- protocol algorithm »
- testing algorithm »
- sharing protocol »
- java application »
- problem sharing »
-
1
QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks
Published 2011“…To overcome these problems Quick Transport Control Protocol (QTCP) algorithm based on optimizations of HS-TCP slow start algorithm and Additive Increase and Multiplicative Decrease (AIMD) algorithm have been proposed. …”
Get full text
Get full text
Conference or Workshop Item -
2
-
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
MAC Protocol for Opportunistic Spectrum Access in Cognitive Radio System
Published 2011“…Opportunistic Spectrum Access (OSA) brings new research challenges in MAC protocol design. It allows unlicensed users to share licensed spectrum in space and time with no or little interference to Primary Users (PUs). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Grouping based radio frequency identification anti-collision protocols for dense internet of things application
Published 2022“…In RFIDs collision occur among tags because tags share communication channel. This is called tag collision problem. …”
Get full text
Get full text
Article -
6
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
7
Performance enhancement of AIMD algorithm for congestion avoidance and control
Published 2011“…These protocols have been developed and improved since the advent of the Internet. …”
Get full text
Get full text
Thesis -
8
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. This algorithm depends on the adaptability of the concept in the ITSWTCM, I2TSWTCM and M2I2TSWTCM algorithms for affecting the fairness and multiple protocols. …”
Get full text
Get full text
Thesis -
9
Key exchange for new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2013“…Key exchange or key establishment is any process in cryptography by which users are able to share or exchange a secret key. The problem on the key exchange is how to exchange any keys or information so that no third party can obtain a copy. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
12
A new routing metric for DYMO protocol on mobile AD HOC network
Published 2013“…Achieving high user data rates over multi-hop wireless paths is considered the ultimate goal for MANET. To overcome this problem, several important modifications to the routing protocol algorithms are then considered to operate better in networks. …”
Get full text
Get full text
Get full text
Thesis -
13
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
Get full text
Get full text
Thesis -
14
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
15
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
Published 2004“…The “reputation sharing” based on a distributed polling iv algorithm in which the resource requestors can assess the reliability of respective provider before initiating the download. …”
Get full text
Get full text
Thesis -
16
A new public key cryptosystem based on IFS
Published 2010“…To encrypt the plaintext with the receiver's public key we use one of the key agreement protocols to generate a shared private key that used to find the attractor of the IFS. …”
Get full text
Get full text
Get full text
Article -
17
Blockchain for Healthcare Medical Records Management System with Sharing Control
Published 2021“…The Blockchain with consensus protocol ensures that information is authentic, and transactions are safe. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
An Efficient Voice Priority Queue (VPQ) Schedular Architectures and Algorithm for VoIP over WLAN Networks
Published 2010“…Low Latency Queuing (LLQ) addresses this problem but undergo from low priority traffic starvation problem. …”
Get full text
Get full text
Get full text
Article -
19
-
20
