Search Results - (( protocol distribution issues algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    MCRP: multiple chain routing protocol for energy efficiency in homogeneous wireless sensor networks by Kareem, Husam, Hashim, Shaiful Jahari, Sali, Aduwati, Taha, Omer W., Kazim, Issraa J., Shukri, Shaimaa

    Published 2019
    “…There are many solutions that can be used to overcome the energy limitation issue and one of the main solutions is the routing algorithm used in the network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Process management is a fundamental problem in distributed systems. It is fast becoming a major performance and design issue for concurrent programming on modern architectures and for the design of distributed systems. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Dynamic object replica placement using underlying routing protocols: ensuring the reliability by Waqas, Ahmad, Majeed, Nahdia, Muhammed Yusof, Zulkefli, Wahees Mahesar, Abdul

    Published 2013
    “…Object replication is an unavoidable phenomenon in distributed systems to address the issues of size, administrative and resources scalability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9

    Advanced Multiple Access Schemes for Multimedia Traffic over Wireless Channels by Habaebi, Mohamed Hadi

    Published 2001
    “…In the context of the AR-TDMA protocol, results show that the priority algorithms improve real-time traffic Quality-of-Service (QoS). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network by Ahmed Al-Doori, Ahmed Jamal

    Published 2018
    “…In order to address the issue in this research presents a novel protocol based on equal power consumption at all network nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…The challenging issue of routing protocols is to reduce the communication overhead for data transmission by determining an optimal path. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Multi-dimensional networking and distributed computing services by Pathan, Al-Sakib Khan

    Published 2012
    “…Furthermore, different types of distributed computing technologies are widening the scope of our thinking and research issues in networking. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure by Khalid, Roszelinda

    Published 2018
    “…Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. This algorithm depends on the adaptability of the concept in the ITSWTCM, I2TSWTCM and M2I2TSWTCM algorithms for affecting the fairness and multiple protocols. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Totally opportunistic routing algorithm for underwater wireless sensor network by Rahman, Ziaur

    Published 2019
    “…In the fourth and final part, a void detection and avoidance based routing protocol called NA-TORA with VA has been presented. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  20. 20

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper