Search Results - (( protocol distributed systems algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…This technique provides high data availability and increases the performance of the distributed systems. In recent years, the number of distributed nodes has become very large in Grid computing system. …”
    Get full text
    Get full text
    Thesis
  2. 2

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Process management is a fundamental problem in distributed systems. It is fast becoming a major performance and design issue for concurrent programming on modern architectures and for the design of distributed systems. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Efficient access of replicated data in distributed database systems by Mat Deris, Mustafa

    Published 2001
    “…Specifically, this thesis present a new protocol called Three Dimensional Grid Structure (TDGS) protocol, to manage data replication in distributed database systems (DDS). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution by Nokhanji, Nooshin

    Published 2014
    “…It makes the cluster-based routing protocols less efficient. Energy Aware Distributed Clustering (EADC) is one of the cluster-based routing protocol proposed for networks with non-uniform node distribution, which can effectively balance the energy consumption among the nodes. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure by Khalid, Roszelinda, Ahmad Zulkarnain, Zuriati

    Published 2014
    “…This research is introducing an enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Dynamic object replica placement using underlying routing protocols: ensuring the reliability by Waqas, Ahmad, Majeed, Nahdia, Muhammed Yusof, Zulkefli, Wahees Mahesar, Abdul

    Published 2013
    “…Object replication is an unavoidable phenomenon in distributed systems to address the issues of size, administrative and resources scalability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure by Khalid, Roszelinda

    Published 2018
    “…We propose the enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…Based on detail SCADA security analysis, the cryptography techniques have been adopted to enhance the security of these critical systems. The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Deployment of new dynamic cryptography buffer for SCADA security enhancement by Aamir, Shahzad, Musa, Shahrulniza, M., Irfan, Shah, Asadullah

    Published 2014
    “…The current study is based on novel solution which deploy the security mechanism, more advance cryptography solution within distributed Network Protocol (DNP3) stack as a part of critical system (or SCADA) system). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    The new enhancement of OLSR energy-saving system in ADHOC network / Suhazlan Suhaimi by Suhaimi, Suhazlan

    Published 2018
    “…As such, this study was undertaken with the main aim to enhance the energy-saving system of MANET, with which nodes can function without failure by using a newly developed algorithm of the OLSR protocol. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A conceptual automated negotiation model for decision making in the construction domain by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M.

    Published 2023
    “…Artificial intelligence; Automation; Autonomous agents; Decision making; Distributed computer systems; Intelligent agents; Multi agent systems; Network architecture; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Negotiation protocol; Value management; Software agents…”
    Conference Paper