Search Results - (( protocol distributed a algorithm ) OR ( java applications using algorithm ))
Search alternatives:
- applications using »
- java applications »
- using algorithm »
- distributed a »
- a algorithm »
-
1
Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution
Published 2014“…Therefore, in this study, a new algorithm called Scheduled-Activity Energy Aware Distributed Clustering (SA-EADC) is proposed. …”
Get full text
Get full text
Thesis -
2
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
Get full text
Get full text
Thesis -
3
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
Get full text
Get full text
Thesis -
4
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
5
-
6
Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study
Published 2017“…Our objective is exploring the literature to present a brief discussion of these algorithms, as well as examine and compare some of distributed, centralized and hybrid clustering algorithm based on several attributes. …”
Get full text
Get full text
Get full text
Article -
7
New synchronization protocol for distributed system with TCP extension
Published 2013“…Process management is a fundamental problem in distributed systems. It is fast becoming a major performance and design issue for concurrent programming on modern architectures and for the design of distributed systems. …”
Get full text
Get full text
Thesis -
8
-
9
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
10
A scheduled activity energy aware distributed clustering algorithm for wireless sensor networks with nonuniform node distribution
Published 2014“…Therefore, in this paper, a new algorithm called scheduled activity EADC (SA-EADC) is proposed. …”
Get full text
Get full text
Get full text
Article -
11
MCRP: multiple chain routing protocol for energy efficiency in homogeneous wireless sensor networks
Published 2019“…Therefore, this research presents a Multiple Chain Routing Protocol for Energy Efficiency in Homogeneous Wireless Sensor Networks (MCRP). …”
Get full text
Get full text
Conference or Workshop Item -
12
Efficient access of replicated data in distributed database systems
Published 2001“…Specifically, this thesis present a new protocol called Three Dimensional Grid Structure (TDGS) protocol, to manage data replication in distributed database systems (DDS). …”
Get full text
Get full text
Thesis -
13
Simplified channel authentication algorithm for secure quantum key distribution
Published 2014“…This paper presents a simplified algorithm of the quantum authentication process (QAP) of the six-state deterministic quantum protocol (6DP). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
-
15
A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks
Published 2019“…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
Get full text
Get full text
Thesis -
16
Evaluation of MAC's distributed queuing algorithm for Internet of things applications
Published 2017Get full text
Get full text
Get full text
Proceeding Paper -
17
Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure
Published 2014“…We are proposing an authentication of multi-party Quantum Key Distribution (MQKD) protocol using an enhanced tight finite key scheme because it will involve a number of parties in cloud infrastructure. …”
Get full text
Get full text
Get full text
Article -
18
Advanced Multiple Access Schemes for Multimedia Traffic over Wireless Channels
Published 2001“…In this thesis, we propose a new Adaptive Reservation TDMA (AR-TDMA) MAC protocol for wireless ATM networks. …”
Get full text
Get full text
Thesis -
19
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
Published 2018“…The consume power fairly (CPF) protocol achieves a high power efficiency by distributing power consumption equal on all the network nodes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
