Search Results - (( using combination protocol algorithm ) OR ( java application _ algorithm ))
Search alternatives:
- protocol algorithm »
- java application »
-
1
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
Published 2008“…The performance analysis of the proposed algorithms was conducted by using the discrete-event simulator, OMNeT++. …”
Get full text
Get full text
Thesis -
2
A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks
Published 2019“…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
Get full text
Get full text
Thesis -
3
Performance comparison encryption of IPSEC VPN encryption techniques / Nur Hasyimah Mohd Ridzuan
Published 2015“…This paper presents the implementation of site to site VPN tunneling using a network simulator. By varying the combination of encryption algorithm 3DES and AES 256 with two hashing type SHA-1 and MD5, the performance of each algorithm was compared and analyzed via Window 7 environment. …”
Get full text
Get full text
Thesis -
4
Performance comparison of encryption IPsec VPN encryption techniques / Nur Hasyimah Mohd Ridzuan and Ruhani Ab Rahman
“…This paper presents the implementation of site to site VPN tunneling using a network simulator. By varying the combination of encryption algorithm 3DES and AES 256 with two hashing type SHA-1 and MD5, the performance of each algorithm was compared and analyzed via Window 7 environment. …”
Get full text
Get full text
Article -
5
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…The performance of CBH protocol is evaluated theoretically and using simulations. …”
Get full text
Get full text
Thesis -
6
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
-
8
-
9
-
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
Development of open platform controller for step-NC compliant CNC system
Published 2020“…Moreover, UOCC system has been extended to online environment via Wi-Fi which utilizes Transmission Control Protocol (TCP) Socket in Java which used the PC as server to create socket thus establishing bind connection between UOCC RM mobile phone and the UOCC system, allowing users to remotely monitor the machining process on mobile platform. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
An improved public key cryptography based on the elliptic curve
Published 2002“…Moreover, the new formula can be used more efficiently when it is combined with the suggested sparse elements algorithms. …”
Get full text
Get full text
Thesis -
13
Finding shortest routing solution in mobile AD HOC networks using firefly algorithm and queuing network analysis
Published 2015“…Firefly algorithm can be applied to find the shortest route in this routing problem. …”
Get full text
Get full text
Article -
14
-
15
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…Ad hoc on-demand distance vector routing protocol (AODV) is a commonly used protocol in MANET. …”
Get full text
Get full text
Get full text
Thesis -
16
Dynamic object replica placement using underlying routing protocols: ensuring the reliability
Published 2013“…In this paper, it is discussed that reliability can be assured if we use replica placement algorithm along with the EIGRP (Enhanced Interior Gateway Routing Protocol). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din
Published 2016“…Hence, this study proposes a new algorithm called Multi-Tier Protocol (MAP). MAP introduced clustering scheme to reduce the energy consumption of wireless sensor network in which, Fuzzy Logic used as tools to select the cluster head and multi-hop communication is used to route the data from the cluster head to the base station. …”
Get full text
Get full text
Thesis -
18
Establishment of perez du-mortier calibration algorithm as a sunphotometers calibration protocol at a altitude above sea level
Published 2017“…Recently, near sea level Langley calibration method for ground based measurement was developed by combining Perez Du- Mortier (PDM) algorithm with statistical filter. …”
Get full text
Get full text
Get full text
Thesis -
19
Efficient access of replicated data in distributed database systems
Published 2001“…Specifically, this thesis present a new protocol called Three Dimensional Grid Structure (TDGS) protocol, to manage data replication in distributed database systems (DDS). …”
Get full text
Get full text
Thesis -
20
Vehicular ad-hoc network (vanets) for electrical vehicle charging management
Published 2025text::Thesis
