Search Results - (( protocol distributed new algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- distributed new »
- new algorithm »
-
1
New synchronization protocol for distributed system with TCP extension
Published 2013“…After embedding the presented solution, a new protocol is created and applied. Thus, the new protocol is available to the communicating packets across all computer networks. …”
Get full text
Get full text
Thesis -
2
Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution
Published 2014“…Therefore, in this study, a new algorithm called Scheduled-Activity Energy Aware Distributed Clustering (SA-EADC) is proposed. …”
Get full text
Get full text
Thesis -
3
-
4
A scheduled activity energy aware distributed clustering algorithm for wireless sensor networks with nonuniform node distribution
Published 2014“…Therefore, in this paper, a new algorithm called scheduled activity EADC (SA-EADC) is proposed. …”
Get full text
Get full text
Get full text
Article -
5
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
6
Efficient access of replicated data in distributed database systems
Published 2001“…Specifically, this thesis present a new protocol called Three Dimensional Grid Structure (TDGS) protocol, to manage data replication in distributed database systems (DDS). …”
Get full text
Get full text
Thesis -
7
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…Therefore, in this thesis, we proposed a new replica control protocol named Cluster-Based Hybrid (CBH) protocol for large-scale system with the objectives to reduce the communication cost, increase data availability, and maintain replica consistency. …”
Get full text
Get full text
Thesis -
8
-
9
Evaluation of MAC's distributed queuing algorithm for Internet of things applications
Published 2017Get full text
Get full text
Get full text
Proceeding Paper -
10
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…Therefore, in this research work a new algorithm was proposed to enhance the capacity of the EDCA protocol and increase the number of the active voice users. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Deployment of new dynamic cryptography buffer for SCADA security enhancement
Published 2014“…This novel study gives new directions for SCADA or its protocols security deployment and enhancement. …”
Get full text
Get full text
Get full text
Article -
12
Advanced Multiple Access Schemes for Multimedia Traffic over Wireless Channels
Published 2001“…In this thesis, we propose a new Adaptive Reservation TDMA (AR-TDMA) MAC protocol for wireless ATM networks. …”
Get full text
Get full text
Thesis -
13
The new enhancement of OLSR energy-saving system in ADHOC network / Suhazlan Suhaimi
Published 2018“…As such, this study was undertaken with the main aim to enhance the energy-saving system of MANET, with which nodes can function without failure by using a newly developed algorithm of the OLSR protocol. Specifically, the study involved the developments of three schemes, namely a new Load Balance Energy Distributed (LBED) scheme, a new enhancement energy-saving (NEES) scheme, and a New Enhanced OLSR Willingness Calculation (NEWC) scheme. …”
Get full text
Get full text
Thesis -
14
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…This is achieved by using a new design algorithm by separating marker TCP and UDP protocols and extended the marking probability for injecting more green and yellow traffic into the network. …”
Get full text
Get full text
Thesis -
15
FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization
Published 2022“…This research proposes a new weight-based, energy-efficient multi-hop protocol: Firefly Synchronization Multi-Hop Geographic Energy-Aware Routing protocol (FSM-GEAR). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
17
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
Published 2018“…Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. …”
Get full text
Get full text
Thesis -
18
Performance analysis of multipath routing based on source routing
Published 2010Get full text
Working Paper -
19
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…In this paper, we present an Authentication-Chains protocol which is a lightweight decentralized protocol for IoT authentication based on blockchain distributed ledger. …”
Get full text
Get full text
Article -
20
