Search Results - (( protocol distributed process algorithm ) OR ( java application need algorithm ))
Search alternatives:
- distributed process »
- process algorithm »
- java application »
- application need »
- need algorithm »
-
1
New synchronization protocol for distributed system with TCP extension
Published 2013“…Process management is a fundamental problem in distributed systems. …”
Get full text
Get full text
Thesis -
2
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
Get full text
Get full text
Thesis -
3
Simplified channel authentication algorithm for secure quantum key distribution
Published 2014“…The quantum channel through which a light beam travels and then examined quantum-mechanically is governed by several quantum cryptographic protocols. This paper presents a simplified algorithm of the quantum authentication process (QAP) of the six-state deterministic quantum protocol (6DP). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
5
A conceptual automated negotiation model for decision making in the construction domain
Published 2023“…Artificial intelligence; Automation; Autonomous agents; Decision making; Distributed computer systems; Intelligent agents; Multi agent systems; Network architecture; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Negotiation protocol; Value management; Software agents…”
Conference Paper -
6
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Encryption method for SCADA security enhancement
Published 2014“…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Deployment of new dynamic cryptography buffer for SCADA security enhancement
Published 2014“…During implementation with DNP3 protocol, the bytes are dynamically stored after processing ( security deployment) within DCB, without affecting the total size of DNP3 protocol stack. …”
Get full text
Get full text
Get full text
Article -
10
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
Published 2018“…Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. …”
Get full text
Get full text
Thesis -
11
FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization
Published 2022“…Based on the testing result, the FSM-GEAR protocol minimized the energy consumption by about 12.5% than the M-GEAR protocol. …”
Get full text
Get full text
Get full text
Thesis -
12
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
Get full text
Get full text
Thesis -
13
Multi-dimensional networking and distributed computing services
Published 2012“…The multi-dimensional research issues include wireless and mobility problems, routing protocols and algorithms, resource and service location protocols, performance evaluations of networking systems, ubiquitous systems, context aware ubiquitous environment, mechanisms to improve throughput over wireless links, network management and network security, and other related areas. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
16
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
17
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…Existing on-demand routing protocols perform route discovery process by flooding the network with a query message (RREQs) requesting a route to the destination. …”
Get full text
Get full text
Get full text
Thesis -
18
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
19
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Some of these challenges result from the transmission of huge amounts of data in each data sensing period and the complexity of SHM algorithms. Furthermore, in WSNs, the operating system (OS) with its network protocol stack and media access control (MAC) layer protocol play an essential role in managing the scarce resources, data processing and communication. …”
Get full text
Get full text
Thesis -
20
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…The emergence of high-volume data exchange like business-to-business and computational sciences that are mission critical and always persist over time have exacted distributed systems and applications to be fast. SOAP is one of the best protocols using XML to exchange message but the XML is too verbose and slows the communication process. …”
Get full text
Get full text
Get full text
Thesis
