Search Results - (( protocol distributed some algorithm ) OR ( java adaptation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study by Hassan, Ali Abdul Hussian, Md Shah, Wahidah, Jabbar Mohammed, Ali Abdul, Othman, Mohd Fairuz Iskandar

    Published 2017
    “…Our objective is exploring the literature to present a brief discussion of these algorithms, as well as examine and compare some of distributed, centralized and hybrid clustering algorithm based on several attributes. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Multi-dimensional networking and distributed computing services by Pathan, Al-Sakib Khan

    Published 2012
    “…The multi-dimensional research issues include wireless and mobility problems, routing protocols and algorithms, resource and service location protocols, performance evaluations of networking systems, ubiquitous systems, context aware ubiquitous environment, mechanisms to improve throughput over wireless links, network management and network security, and other related areas. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    General purpose search and classification algorithms for distributed information access by Siraj, Fadzilah, Wan Ishak, Wan Hussain

    Published 2000
    “…Users have to visit each URLs even though the page does not suit their requests.Therefore, it is vital to provide efficient and timely Internet search algorithm to ensure the success of distributed services, particularly to facilitate the current and future applications of national information superhighway. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm by Zeni, Saltihie

    Published 2012
    “…Meanwhile in LEACH, the cluster head selection was based on distributed algorithm. Both of these protocols was implemented in network simulator to compare the performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A generator of cauchy-distributed time series with specific Hurst index by Estrada-Vargas, Leopoldo, Toral-Cruz, Homero, Pathan, Al-Sakib Khan

    Published 2011
    “…The proposed algorithm consists of an inverse cumulative distribution function (ICDF) transformation, a wavelet-analysis synthesis and, finally, a linear transformation. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring by Al-Mekhlafi, Mohamed Abdulkarem Taher

    Published 2021
    “…Nevertheless, the requirements of WSN-based SHM add extra complications and challenges to network design and the existing limitations of WSN technology. Some of these challenges result from the transmission of huge amounts of data in each data sensing period and the complexity of SHM algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    SNR-Based OLSR Routing Protocol for Wireless Mesh Networks by Elobaid, Mohamed Elshaikh

    Published 2009
    “…In a multi-hop networks, like WMN, one of the main factors that influences the performance is the routing protocol. Generally speaking, routing protocols can be classified based-on the routing metric to 1) hop count-based routing protocols, like Adhoc on demand distance vector (AODV) where the optimum path is defined as the path that goes through the minimum number of nodes, 2) the link quality-based routing protocols, like OLSR where some metrics such as the bandwidth and the packet error rate are considered to define the optimum path to the destination. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…This thesis deals with traffic management by improving some algorithms in routing and congestion avoidance to guarantee the subscribers to have their desired QoS. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Totally opportunistic routing algorithm for underwater wireless sensor network by Rahman, Ziaur

    Published 2019
    “…Simulation results show that NA-TORA significantly improves the network performance when compared to some relevant existing routing protocols, such as VBF, HH-VBF, and TORA, for energy consumption, average end-to-end delay, and packet delivery ratio. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…Another prominent approach is the Dominant Pruning (DP) which is a distributed dominating set algorithm developed to alleviate the impact of flooding in mobile ad-hoc networks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems by Sinnanaidu, Subba Rao

    Published 2004
    “…The “reputation sharing” based on a distributed polling iv algorithm in which the resource requestors can assess the reliability of respective provider before initiating the download. …”
    Get full text
    Get full text
    Thesis
  20. 20