Search Results - (( protocol distribution process algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Process management is a fundamental problem in distributed systems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Simplified channel authentication algorithm for secure quantum key distribution by Elwadeya, Mohamed Youssef Khalaf, Al-Khateeb, Khalid A. Saeed, Hasbullah, Nurul Fadzlin

    Published 2014
    “…The quantum channel through which a light beam travels and then examined quantum-mechanically is governed by several quantum cryptographic protocols. This paper presents a simplified algorithm of the quantum authentication process (QAP) of the six-state deterministic quantum protocol (6DP). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    A conceptual automated negotiation model for decision making in the construction domain by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M.

    Published 2023
    “…Artificial intelligence; Automation; Autonomous agents; Decision making; Distributed computer systems; Intelligent agents; Multi agent systems; Network architecture; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Negotiation protocol; Value management; Software agents…”
    Conference Paper
  5. 5

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Deployment of new dynamic cryptography buffer for SCADA security enhancement by Aamir, Shahzad, Musa, Shahrulniza, M., Irfan, Shah, Asadullah

    Published 2014
    “…During implementation with DNP3 protocol, the bytes are dynamically stored after processing ( security deployment) within DCB, without affecting the total size of DNP3 protocol stack. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure by Khalid, Roszelinda

    Published 2018
    “…Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
    Get full text
    Get full text
    Thesis
  10. 10

    FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization by Mutiara, Giva Andriana

    Published 2022
    “…Based on the testing result, the FSM-GEAR protocol minimized the energy consumption by about 12.5% than the M-GEAR protocol. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Multi-dimensional networking and distributed computing services by Pathan, Al-Sakib Khan

    Published 2012
    “…The multi-dimensional research issues include wireless and mobility problems, routing protocols and algorithms, resource and service location protocols, performance evaluations of networking systems, ubiquitous systems, context aware ubiquitous environment, mechanisms to improve throughput over wireless links, network management and network security, and other related areas. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…Existing on-demand routing protocols perform route discovery process by flooding the network with a query message (RREQs) requesting a route to the destination. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring by Al-Mekhlafi, Mohamed Abdulkarem Taher

    Published 2021
    “…Some of these challenges result from the transmission of huge amounts of data in each data sensing period and the complexity of SHM algorithms. Furthermore, in WSNs, the operating system (OS) with its network protocol stack and media access control (MAC) layer protocol play an essential role in managing the scarce resources, data processing and communication. …”
    Get full text
    Get full text
    Thesis
  15. 15

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…The emergence of high-volume data exchange like business-to-business and computational sciences that are mission critical and always persist over time have exacted distributed systems and applications to be fast. SOAP is one of the best protocols using XML to exchange message but the XML is too verbose and slows the communication process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links by Waheed, Bassam M. S., Mohd Ali, Borhanuddin, Khatun, Sabira, Mohd Sidek, Roslina

    Published 2014
    “…In this study, the notion of constructing connected-dominating-set is extended to ad-hoc networks with unidirectional links. An enhanced distributed algorithm is presented that is based on the marking process which is has been introduced in earlier work. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model by Jasim, Ahmed Abdulhadi, Idris, Mohd Yamani Idna, Azzuhri, Saaidal Razalli, Issa, Noor Riyadh, Noor, Noorzaily Mohamed, Kakarla, Jagadeesh, Amiri, Iraj Sadegh

    Published 2019
    “…This newly developed protocol is named Secure and Energy-Efficient Data Aggregation (SEEDA), which is the extension of SDAACA protocol. …”
    Get full text
    Get full text
    Article
  19. 19

    Energy Efficient LEACH (EE-LEACH) Routing Algorithm for Wireless Sensor Networks by Pillay, Kosheila Sundram

    Published 2019
    “…Therefore, this research work proposes an energy-efficient LEACH (EE-LEACH) algorithm to elect CHs based on residual energy, RSSI, and random probability to distribute the load evenly among the CHs. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A generator of cauchy-distributed time series with specific Hurst index by Estrada-Vargas, Leopoldo, Toral-Cruz, Homero, Pathan, Al-Sakib Khan

    Published 2011
    “…The proposed algorithm consists of an inverse cumulative distribution function (ICDF) transformation, a wavelet-analysis synthesis and, finally, a linear transformation. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper