Search Results - (( using combination protocol algorithm ) OR ( java applications cloud algorithm ))
Search alternatives:
- protocol algorithm »
- applications cloud »
- java applications »
- cloud algorithm »
-
1
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
3
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
Get full text
Get full text
Thesis -
4
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
Published 2008“…The performance analysis of the proposed algorithms was conducted by using the discrete-event simulator, OMNeT++. …”
Get full text
Get full text
Thesis -
5
A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks
Published 2019“…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
Get full text
Get full text
Thesis -
6
Performance comparison encryption of IPSEC VPN encryption techniques / Nur Hasyimah Mohd Ridzuan
Published 2015“…This paper presents the implementation of site to site VPN tunneling using a network simulator. By varying the combination of encryption algorithm 3DES and AES 256 with two hashing type SHA-1 and MD5, the performance of each algorithm was compared and analyzed via Window 7 environment. …”
Get full text
Get full text
Thesis -
7
Performance comparison of encryption IPsec VPN encryption techniques / Nur Hasyimah Mohd Ridzuan and Ruhani Ab Rahman
“…This paper presents the implementation of site to site VPN tunneling using a network simulator. By varying the combination of encryption algorithm 3DES and AES 256 with two hashing type SHA-1 and MD5, the performance of each algorithm was compared and analyzed via Window 7 environment. …”
Get full text
Get full text
Article -
8
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…The performance of CBH protocol is evaluated theoretically and using simulations. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
An improved public key cryptography based on the elliptic curve
Published 2002“…Moreover, the new formula can be used more efficiently when it is combined with the suggested sparse elements algorithms. …”
Get full text
Get full text
Thesis -
12
Finding shortest routing solution in mobile AD HOC networks using firefly algorithm and queuing network analysis
Published 2015“…Firefly algorithm can be applied to find the shortest route in this routing problem. …”
Get full text
Get full text
Article -
13
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…Ad hoc on-demand distance vector routing protocol (AODV) is a commonly used protocol in MANET. …”
Get full text
Get full text
Get full text
Thesis -
14
Dynamic object replica placement using underlying routing protocols: ensuring the reliability
Published 2013“…In this paper, it is discussed that reliability can be assured if we use replica placement algorithm along with the EIGRP (Enhanced Interior Gateway Routing Protocol). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din
Published 2016“…Hence, this study proposes a new algorithm called Multi-Tier Protocol (MAP). MAP introduced clustering scheme to reduce the energy consumption of wireless sensor network in which, Fuzzy Logic used as tools to select the cluster head and multi-hop communication is used to route the data from the cluster head to the base station. …”
Get full text
Get full text
Thesis -
16
Establishment of perez du-mortier calibration algorithm as a sunphotometers calibration protocol at a altitude above sea level
Published 2017“…Recently, near sea level Langley calibration method for ground based measurement was developed by combining Perez Du- Mortier (PDM) algorithm with statistical filter. …”
Get full text
Get full text
Get full text
Thesis -
17
Efficient access of replicated data in distributed database systems
Published 2001“…Specifically, this thesis present a new protocol called Three Dimensional Grid Structure (TDGS) protocol, to manage data replication in distributed database systems (DDS). …”
Get full text
Get full text
Thesis -
18
Vehicular ad-hoc network (vanets) for electrical vehicle charging management
Published 2025text::Thesis -
19
Implementation of the Merkle-Hellman knapsack cryptosystem into station-to-station protocol / Nurzhulaika Yahya, Noor Izzah Agil and Nur ‘Afini Nordin
Published 2023“…The station-to-station protocol is integrated with the Merkle-Hellman knapsack cryptosystem for a particular use or application when the Merkle-Hellman knapsack cryptosystem is included into the protocol. …”
Get full text
Get full text
Student Project -
20
