Search Results - (( protocol distributed systems algorithm ) OR ( java application using algorithm ))
Search alternatives:
- distributed systems »
- systems algorithm »
- java application »
- using algorithm »
-
1
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…This technique provides high data availability and increases the performance of the distributed systems. In recent years, the number of distributed nodes has become very large in Grid computing system. …”
Get full text
Get full text
Thesis -
2
New synchronization protocol for distributed system with TCP extension
Published 2013“…Process management is a fundamental problem in distributed systems. It is fast becoming a major performance and design issue for concurrent programming on modern architectures and for the design of distributed systems. …”
Get full text
Get full text
Thesis -
3
Efficient access of replicated data in distributed database systems
Published 2001“…Specifically, this thesis present a new protocol called Three Dimensional Grid Structure (TDGS) protocol, to manage data replication in distributed database systems (DDS). …”
Get full text
Get full text
Thesis -
4
Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution
Published 2014“…It makes the cluster-based routing protocols less efficient. Energy Aware Distributed Clustering (EADC) is one of the cluster-based routing protocol proposed for networks with non-uniform node distribution, which can effectively balance the energy consumption among the nodes. …”
Get full text
Get full text
Thesis -
5
-
6
Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure
Published 2014“…This research is introducing an enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure. …”
Get full text
Get full text
Get full text
Article -
7
Dynamic object replica placement using underlying routing protocols: ensuring the reliability
Published 2013“…Object replication is an unavoidable phenomenon in distributed systems to address the issues of size, administrative and resources scalability. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
9
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
10
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
Published 2018“…We propose the enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
14
-
15
Encryption method for SCADA security enhancement
Published 2014“…Based on detail SCADA security analysis, the cryptography techniques have been adopted to enhance the security of these critical systems. The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
16
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
17
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023text::Thesis -
18
Deployment of new dynamic cryptography buffer for SCADA security enhancement
Published 2014“…The current study is based on novel solution which deploy the security mechanism, more advance cryptography solution within distributed Network Protocol (DNP3) stack as a part of critical system (or SCADA) system). …”
Get full text
Get full text
Get full text
Article -
19
The new enhancement of OLSR energy-saving system in ADHOC network / Suhazlan Suhaimi
Published 2018“…As such, this study was undertaken with the main aim to enhance the energy-saving system of MANET, with which nodes can function without failure by using a newly developed algorithm of the OLSR protocol. …”
Get full text
Get full text
Thesis -
20
A conceptual automated negotiation model for decision making in the construction domain
Published 2023“…Artificial intelligence; Automation; Autonomous agents; Decision making; Distributed computer systems; Intelligent agents; Multi agent systems; Network architecture; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Negotiation protocol; Value management; Software agents…”
Conference Paper
