Search Results - (( protocol distributed new algorithm ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- distributed new »
- using algorithm »
- new algorithm »
-
1
New synchronization protocol for distributed system with TCP extension
Published 2013“…After embedding the presented solution, a new protocol is created and applied. Thus, the new protocol is available to the communicating packets across all computer networks. …”
Get full text
Get full text
Thesis -
2
Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution
Published 2014“…Therefore, in this study, a new algorithm called Scheduled-Activity Energy Aware Distributed Clustering (SA-EADC) is proposed. …”
Get full text
Get full text
Thesis -
3
-
4
A scheduled activity energy aware distributed clustering algorithm for wireless sensor networks with nonuniform node distribution
Published 2014“…Therefore, in this paper, a new algorithm called scheduled activity EADC (SA-EADC) is proposed. …”
Get full text
Get full text
Get full text
Article -
5
Efficient access of replicated data in distributed database systems
Published 2001“…Specifically, this thesis present a new protocol called Three Dimensional Grid Structure (TDGS) protocol, to manage data replication in distributed database systems (DDS). …”
Get full text
Get full text
Thesis -
6
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…Therefore, in this thesis, we proposed a new replica control protocol named Cluster-Based Hybrid (CBH) protocol for large-scale system with the objectives to reduce the communication cost, increase data availability, and maintain replica consistency. …”
Get full text
Get full text
Thesis -
7
-
8
Evaluation of MAC's distributed queuing algorithm for Internet of things applications
Published 2017Get full text
Get full text
Get full text
Proceeding Paper -
9
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…Therefore, in this research work a new algorithm was proposed to enhance the capacity of the EDCA protocol and increase the number of the active voice users. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
11
Deployment of new dynamic cryptography buffer for SCADA security enhancement
Published 2014“…This novel study gives new directions for SCADA or its protocols security deployment and enhancement. …”
Get full text
Get full text
Get full text
Article -
12
Advanced Multiple Access Schemes for Multimedia Traffic over Wireless Channels
Published 2001“…In this thesis, we propose a new Adaptive Reservation TDMA (AR-TDMA) MAC protocol for wireless ATM networks. …”
Get full text
Get full text
Thesis -
13
-
14
The new enhancement of OLSR energy-saving system in ADHOC network / Suhazlan Suhaimi
Published 2018“…As such, this study was undertaken with the main aim to enhance the energy-saving system of MANET, with which nodes can function without failure by using a newly developed algorithm of the OLSR protocol. Specifically, the study involved the developments of three schemes, namely a new Load Balance Energy Distributed (LBED) scheme, a new enhancement energy-saving (NEES) scheme, and a New Enhanced OLSR Willingness Calculation (NEWC) scheme. …”
Get full text
Get full text
Thesis -
15
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
16
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…This is achieved by using a new design algorithm by separating marker TCP and UDP protocols and extended the marking probability for injecting more green and yellow traffic into the network. …”
Get full text
Get full text
Thesis -
17
FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization
Published 2022“…This research proposes a new weight-based, energy-efficient multi-hop protocol: Firefly Synchronization Multi-Hop Geographic Energy-Aware Routing protocol (FSM-GEAR). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
Published 2018“…Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. …”
Get full text
Get full text
Thesis -
19
Performance analysis of multipath routing based on source routing
Published 2010Get full text
Working Paper -
20
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…In this paper, we present an Authentication-Chains protocol which is a lightweight decentralized protocol for IoT authentication based on blockchain distributed ledger. …”
Get full text
Get full text
Article
