Search Results - (( protocol distributed new algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…After embedding the presented solution, a new protocol is created and applied. Thus, the new protocol is available to the communicating packets across all computer networks. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution by Nokhanji, Nooshin

    Published 2014
    “…Therefore, in this study, a new algorithm called Scheduled-Activity Energy Aware Distributed Clustering (SA-EADC) is proposed. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Efficient access of replicated data in distributed database systems by Mat Deris, Mustafa

    Published 2001
    “…Specifically, this thesis present a new protocol called Three Dimensional Grid Structure (TDGS) protocol, to manage data replication in distributed database systems (DDS). …”
    Get full text
    Get full text
    Thesis
  6. 6

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…Therefore, in this thesis, we proposed a new replica control protocol named Cluster-Based Hybrid (CBH) protocol for large-scale system with the objectives to reduce the communication cost, increase data availability, and maintain replica consistency. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…Therefore, in this research work a new algorithm was proposed to enhance the capacity of the EDCA protocol and increase the number of the active voice users. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Deployment of new dynamic cryptography buffer for SCADA security enhancement by Aamir, Shahzad, Musa, Shahrulniza, M., Irfan, Shah, Asadullah

    Published 2014
    “…This novel study gives new directions for SCADA or its protocols security deployment and enhancement. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Advanced Multiple Access Schemes for Multimedia Traffic over Wireless Channels by Habaebi, Mohamed Hadi

    Published 2001
    “…In this thesis, we propose a new Adaptive Reservation TDMA (AR-TDMA) MAC protocol for wireless ATM networks. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    The new enhancement of OLSR energy-saving system in ADHOC network / Suhazlan Suhaimi by Suhaimi, Suhazlan

    Published 2018
    “…As such, this study was undertaken with the main aim to enhance the energy-saving system of MANET, with which nodes can function without failure by using a newly developed algorithm of the OLSR protocol. Specifically, the study involved the developments of three schemes, namely a new Load Balance Energy Distributed (LBED) scheme, a new enhancement energy-saving (NEES) scheme, and a New Enhanced OLSR Willingness Calculation (NEWC) scheme. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…This is achieved by using a new design algorithm by separating marker TCP and UDP protocols and extended the marking probability for injecting more green and yellow traffic into the network. …”
    Get full text
    Get full text
    Thesis
  17. 17

    FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization by Mutiara, Giva Andriana

    Published 2022
    “…This research proposes a new weight-based, energy-efficient multi-hop protocol: Firefly Synchronization Multi-Hop Geographic Energy-Aware Routing protocol (FSM-GEAR). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure by Khalid, Roszelinda

    Published 2018
    “…Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks by Al Ahmed, Mahmoud Tayseer, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Abdullah, Azizol

    Published 2023
    “…In this paper, we present an Authentication-Chains protocol which is a lightweight decentralized protocol for IoT authentication based on blockchain distributed ledger. …”
    Get full text
    Get full text
    Article