Search Results - (( using system protocol algorithm ) OR ( java application during algorithm ))
Search alternatives:
- protocol algorithm »
- application during »
- java application »
- during algorithm »
- system protocol »
- using system »
-
1
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017“…Thus, smart protocol algorithm is developed to replace the previous system. …”
Get full text
Get full text
Monograph -
2
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…The results show that employing LDPC code for DF protocol relay system can achieve better error rate performance than that of using non-cooperative and other existing relay protocol systems which are AF, DF, and DF protocol relay system using Turbo code. …”
Get full text
Get full text
Get full text
Thesis -
3
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…The performance of CBH protocol is evaluated theoretically and using simulations. …”
Get full text
Get full text
Thesis -
4
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
5
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
6
Implementation of Station-To-Station (STS) protocol using Elliptic Curve Digital Signature Al Algorithm / Muhammad Faris Fakhri Rozi, Alya Syuhada Ismail and Emylia Suhaimi
Published 2018“…This protocol will provide an element of authentication element and data integrity in the system. …”
Get full text
Get full text
Student Project -
7
On the security of digital signature protocol based on iterated function systems.
Published 2011“…A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. …”
Get full text
Get full text
Get full text
Article -
8
GPS-less Localization Protocol for Underwater Acoustic Networks
Published 2008“…Unfortunately, using GPS in the sub-sea environment is impossible and positioning requires the use of special systems. …”
Get full text
Get full text
Get full text
Article -
9
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…To facilitate communication within the network, a routing protocol is used to dis- cover routes between nodes. …”
Get full text
Get full text
Thesis -
10
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
Published 2014“…The Wireless Sensor Network (WSN) is defined to connect the sensors by using a set of protocols. The IEEE 802.15.4 standard includes the required protocols to construct a WSN. …”
Get full text
Get full text
Thesis -
11
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
Published 2008“…The performance analysis of the proposed algorithms was conducted by using the discrete-event simulator, OMNeT++. …”
Get full text
Get full text
Thesis -
12
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…The proposed routing algorithm is simulated using MATLAB for performance evaluations. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
New synchronization protocol for distributed system with TCP extension
Published 2013“…Optimization of process allocation causes to decrease the network traffic and fairer allocation, and therefore,optimization of fault-tolerance. The new protocol is simulated with using the OPNET and the MATLAB software. …”
Get full text
Get full text
Thesis -
14
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…An enhanced routing protocol, which is used to route the BL video packets, namely the improved video transmission protocol (IVRP) was proposed. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. …”
Get full text
Get full text
Thesis -
17
A true random number generator for crypto embedded systems
Published 2006“…In this paper, we design a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers. …”
Get full text
Get full text
Article -
18
QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks
Published 2011Get full text
Get full text
Conference or Workshop Item -
19
Development of wireless data acquisiton system using LoRa technology for construction of PID control system
Published 2025text::Thesis -
20
Efficient access of replicated data in distributed database systems
Published 2001“…Specifically, this thesis present a new protocol called Three Dimensional Grid Structure (TDGS) protocol, to manage data replication in distributed database systems (DDS). …”
Get full text
Get full text
Thesis
