Search Results - (( protocol distributed _ algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution by Nokhanji, Nooshin

    Published 2014
    “…It makes the cluster-based routing protocols less efficient. Energy Aware Distributed Clustering (EADC) is one of the cluster-based routing protocol proposed for networks with non-uniform node distribution, which can effectively balance the energy consumption among the nodes. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  9. 9

    MCRP: multiple chain routing protocol for energy efficiency in homogeneous wireless sensor networks by Kareem, Husam, Hashim, Shaiful Jahari, Sali, Aduwati, Taha, Omer W., Kazim, Issraa J., Shukri, Shaimaa

    Published 2019
    “…Simulation results demonstrate that the presented algorithm MCRP achieves its design goals and outperforms the existing work such as Chain-Chain based routing protocol (CCBRP), and Two-stage chain routing protocol (TSCP) algorithms in terms of Network lifetime, FND and LND (first node and last node died), Network stability period, and Energy consumption.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A scheduled activity energy aware distributed clustering algorithm for wireless sensor networks with nonuniform node distribution by Nokhanji, Nooshin, Mohd Hanapi, Zurina, Subramaniam, Shamala, Mohamed, Mohamad Afendee

    Published 2014
    “…Energy aware distributed clustering (EADC) is one of the cluster-based routing protocols proposed for networks with nonuniform node distribution, which can effectively balance the energy consumption among the nodes. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Efficient access of replicated data in distributed database systems by Mat Deris, Mustafa

    Published 2001
    “…Specifically, this thesis present a new protocol called Three Dimensional Grid Structure (TDGS) protocol, to manage data replication in distributed database systems (DDS). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Simplified channel authentication algorithm for secure quantum key distribution by Elwadeya, Mohamed Youssef Khalaf, Al-Khateeb, Khalid A. Saeed, Hasbullah, Nurul Fadzlin

    Published 2014
    “…The quantum channel through which a light beam travels and then examined quantum-mechanically is governed by several quantum cryptographic protocols. This paper presents a simplified algorithm of the quantum authentication process (QAP) of the six-state deterministic quantum protocol (6DP). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14
  15. 15

    A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks by Jiang, Cailing

    Published 2019
    “…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure by Khalid, Roszelinda, Ahmad Zulkarnain, Zuriati

    Published 2014
    “…Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network by Ahmed Al-Doori, Ahmed Jamal

    Published 2018
    “…The consume power fairly (CPF) protocol achieves a high power efficiency by distributing power consumption equal on all the network nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Advanced Multiple Access Schemes for Multimedia Traffic over Wireless Channels by Habaebi, Mohamed Hadi

    Published 2001
    “…Finally, an algorithm is proposed to integrate these algorithms to provide ubiquitous wireless ATM services. …”
    Get full text
    Get full text
    Thesis
  20. 20