Search Results - (( protocol distributed issues algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- distributed issues »
- issues algorithm »
- java application »
-
1
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
Get full text
Get full text
Thesis -
2
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
Get full text
Get full text
Thesis -
3
-
4
MCRP: multiple chain routing protocol for energy efficiency in homogeneous wireless sensor networks
Published 2019“…There are many solutions that can be used to overcome the energy limitation issue and one of the main solutions is the routing algorithm used in the network. …”
Get full text
Get full text
Conference or Workshop Item -
5
New synchronization protocol for distributed system with TCP extension
Published 2013“…Process management is a fundamental problem in distributed systems. It is fast becoming a major performance and design issue for concurrent programming on modern architectures and for the design of distributed systems. …”
Get full text
Get full text
Thesis -
6
Dynamic object replica placement using underlying routing protocols: ensuring the reliability
Published 2013“…Object replication is an unavoidable phenomenon in distributed systems to address the issues of size, administrative and resources scalability. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
-
8
Advanced Multiple Access Schemes for Multimedia Traffic over Wireless Channels
Published 2001“…In the context of the AR-TDMA protocol, results show that the priority algorithms improve real-time traffic Quality-of-Service (QoS). …”
Get full text
Get full text
Thesis -
9
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
Published 2018“…In order to address the issue in this research presents a novel protocol based on equal power consumption at all network nodes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…The challenging issue of routing protocols is to reduce the communication overhead for data transmission by determining an optimal path. …”
Get full text
Get full text
Thesis -
11
Multi-dimensional networking and distributed computing services
Published 2012“…Furthermore, different types of distributed computing technologies are widening the scope of our thinking and research issues in networking. …”
Get full text
Get full text
Get full text
Article -
12
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
Published 2018“…Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. This algorithm depends on the adaptability of the concept in the ITSWTCM, I2TSWTCM and M2I2TSWTCM algorithms for affecting the fairness and multiple protocols. …”
Get full text
Get full text
Thesis -
16
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…This paper presents a new protocol to address the security and energy issue in Wireless Sensor Network (WSN). …”
Get full text
Get full text
Article -
17
Totally opportunistic routing algorithm for underwater wireless sensor network
Published 2019“…In the fourth and final part, a void detection and avoidance based routing protocol called NA-TORA with VA has been presented. …”
Get full text
Get full text
Thesis -
18
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Energy-Aware Routing Hole Detection Algorithm in the Hierarchical Wireless Sensor Network
Published 2019“…To minimize the communication overhead with the help of optimal path selection in Wireless Sensor Network (WSN) routing protocols is the challenging issue. Hierarchical routing optimizes energy utilization by distributing the workload among different clusters. …”
Get full text
Get full text
Get full text
Article -
20
