Search Results - (( protocol distributed process algorithm ) OR ( java application means algorithm ))

Refine Results
  1. 1

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Process management is a fundamental problem in distributed systems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Simplified channel authentication algorithm for secure quantum key distribution by Elwadeya, Mohamed Youssef Khalaf, Al-Khateeb, Khalid A. Saeed, Hasbullah, Nurul Fadzlin

    Published 2014
    “…The quantum channel through which a light beam travels and then examined quantum-mechanically is governed by several quantum cryptographic protocols. This paper presents a simplified algorithm of the quantum authentication process (QAP) of the six-state deterministic quantum protocol (6DP). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    A conceptual automated negotiation model for decision making in the construction domain by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M.

    Published 2023
    “…Artificial intelligence; Automation; Autonomous agents; Decision making; Distributed computer systems; Intelligent agents; Multi agent systems; Network architecture; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Negotiation protocol; Value management; Software agents…”
    Conference Paper
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The K-means algorithm has been around for over a century. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Deployment of new dynamic cryptography buffer for SCADA security enhancement by Aamir, Shahzad, Musa, Shahrulniza, M., Irfan, Shah, Asadullah

    Published 2014
    “…During implementation with DNP3 protocol, the bytes are dynamically stored after processing ( security deployment) within DCB, without affecting the total size of DNP3 protocol stack. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
    Get full text
    Get full text
    Journal
  11. 11

    Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure by Khalid, Roszelinda

    Published 2018
    “…Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
    Get full text
    Get full text
    Thesis
  13. 13

    FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization by Mutiara, Giva Andriana

    Published 2022
    “…Based on the testing result, the FSM-GEAR protocol minimized the energy consumption by about 12.5% than the M-GEAR protocol. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Multi-dimensional networking and distributed computing services by Pathan, Al-Sakib Khan

    Published 2012
    “…The multi-dimensional research issues include wireless and mobility problems, routing protocols and algorithms, resource and service location protocols, performance evaluations of networking systems, ubiquitous systems, context aware ubiquitous environment, mechanisms to improve throughput over wireless links, network management and network security, and other related areas. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…Existing on-demand routing protocols perform route discovery process by flooding the network with a query message (RREQs) requesting a route to the destination. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring by Al-Mekhlafi, Mohamed Abdulkarem Taher

    Published 2021
    “…Some of these challenges result from the transmission of huge amounts of data in each data sensing period and the complexity of SHM algorithms. Furthermore, in WSNs, the operating system (OS) with its network protocol stack and media access control (MAC) layer protocol play an essential role in managing the scarce resources, data processing and communication. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…The emergence of high-volume data exchange like business-to-business and computational sciences that are mission critical and always persist over time have exacted distributed systems and applications to be fast. SOAP is one of the best protocols using XML to exchange message but the XML is too verbose and slows the communication process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links by Waheed, Bassam M. S., Mohd Ali, Borhanuddin, Khatun, Sabira, Mohd Sidek, Roslina

    Published 2014
    “…In this study, the notion of constructing connected-dominating-set is extended to ad-hoc networks with unidirectional links. An enhanced distributed algorithm is presented that is based on the marking process which is has been introduced in earlier work. …”
    Get full text
    Get full text
    Get full text
    Article