Search Results - (( protocol distributed process algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Process management is a fundamental problem in distributed systems. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Simplified channel authentication algorithm for secure quantum key distribution by Elwadeya, Mohamed Youssef Khalaf, Al-Khateeb, Khalid A. Saeed, Hasbullah, Nurul Fadzlin

    Published 2014
    “…The quantum channel through which a light beam travels and then examined quantum-mechanically is governed by several quantum cryptographic protocols. This paper presents a simplified algorithm of the quantum authentication process (QAP) of the six-state deterministic quantum protocol (6DP). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10

    A conceptual automated negotiation model for decision making in the construction domain by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M.

    Published 2023
    “…Artificial intelligence; Automation; Autonomous agents; Decision making; Distributed computer systems; Intelligent agents; Multi agent systems; Network architecture; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Negotiation protocol; Value management; Software agents…”
    Conference Paper
  11. 11

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Deployment of new dynamic cryptography buffer for SCADA security enhancement by Aamir, Shahzad, Musa, Shahrulniza, M., Irfan, Shah, Asadullah

    Published 2014
    “…During implementation with DNP3 protocol, the bytes are dynamically stored after processing ( security deployment) within DCB, without affecting the total size of DNP3 protocol stack. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure by Khalid, Roszelinda

    Published 2018
    “…Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
    Get full text
    Get full text
    Thesis
  16. 16

    FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization by Mutiara, Giva Andriana

    Published 2022
    “…Based on the testing result, the FSM-GEAR protocol minimized the energy consumption by about 12.5% than the M-GEAR protocol. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Multi-dimensional networking and distributed computing services by Pathan, Al-Sakib Khan

    Published 2012
    “…The multi-dimensional research issues include wireless and mobility problems, routing protocols and algorithms, resource and service location protocols, performance evaluations of networking systems, ubiquitous systems, context aware ubiquitous environment, mechanisms to improve throughput over wireless links, network management and network security, and other related areas. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…Existing on-demand routing protocols perform route discovery process by flooding the network with a query message (RREQs) requesting a route to the destination. …”
    Get full text
    Get full text
    Get full text
    Thesis