Search Results - (( protocol distribution a algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution by Nokhanji, Nooshin

    Published 2014
    “…Therefore, in this study, a new algorithm called Scheduled-Activity Energy Aware Distributed Clustering (SA-EADC) is proposed. …”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study by Hassan, Ali Abdul Hussian, Md Shah, Wahidah, Jabbar Mohammed, Ali Abdul, Othman, Mohd Fairuz Iskandar

    Published 2017
    “…Our objective is exploring the literature to present a brief discussion of these algorithms, as well as examine and compare some of distributed, centralized and hybrid clustering algorithm based on several attributes. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Process management is a fundamental problem in distributed systems. It is fast becoming a major performance and design issue for concurrent programming on modern architectures and for the design of distributed systems. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    MCRP: multiple chain routing protocol for energy efficiency in homogeneous wireless sensor networks by Kareem, Husam, Hashim, Shaiful Jahari, Sali, Aduwati, Taha, Omer W., Kazim, Issraa J., Shukri, Shaimaa

    Published 2019
    “…Therefore, this research presents a Multiple Chain Routing Protocol for Energy Efficiency in Homogeneous Wireless Sensor Networks (MCRP). …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Efficient access of replicated data in distributed database systems by Mat Deris, Mustafa

    Published 2001
    “…Specifically, this thesis present a new protocol called Three Dimensional Grid Structure (TDGS) protocol, to manage data replication in distributed database systems (DDS). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Simplified channel authentication algorithm for secure quantum key distribution by Elwadeya, Mohamed Youssef Khalaf, Al-Khateeb, Khalid A. Saeed, Hasbullah, Nurul Fadzlin

    Published 2014
    “…This paper presents a simplified algorithm of the quantum authentication process (QAP) of the six-state deterministic quantum protocol (6DP). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  14. 14

    A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks by Jiang, Cailing

    Published 2019
    “…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure by Khalid, Roszelinda, Ahmad Zulkarnain, Zuriati

    Published 2014
    “…We are proposing an authentication of multi-party Quantum Key Distribution (MQKD) protocol using an enhanced tight finite key scheme because it will involve a number of parties in cloud infrastructure. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Advanced Multiple Access Schemes for Multimedia Traffic over Wireless Channels by Habaebi, Mohamed Hadi

    Published 2001
    “…In this thesis, we propose a new Adaptive Reservation TDMA (AR-TDMA) MAC protocol for wireless ATM networks. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network by Ahmed Al-Doori, Ahmed Jamal

    Published 2018
    “…The consume power fairly (CPF) protocol achieves a high power efficiency by distributing power consumption equal on all the network nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…Therefore, in this research work a new algorithm was proposed to enhance the capacity of the EDCA protocol and increase the number of the active voice users. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis