Search Results - (( variable extractions method algorithm ) OR ( protocol distributed model algorithm ))

Refine Results
  1. 1

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…The thesis shows that it is possible to model the processes of distributed system in the form of a three dimensional matrix, so as to optimize fault-tolerant for mutual exclusion and critical section management. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Efficient access of replicated data in distributed database systems by Mat Deris, Mustafa

    Published 2001
    “…Specifically, this thesis present a new protocol called Three Dimensional Grid Structure (TDGS) protocol, to manage data replication in distributed database systems (DDS). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…Enhanced Distributed Channel Access (EDCA) protocol is used to support quality of service (QoS). …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks by Jiang, Cailing

    Published 2019
    “…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
    Get full text
    Get full text
    Thesis
  5. 5

    FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization by Mutiara, Giva Andriana

    Published 2022
    “…This model was used to examine and test the FSM- GEAR Protocol and the previous M-GEAR. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks by Al Ahmed, Mahmoud Tayseer, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Abdullah, Azizol

    Published 2023
    “…In this paper, we present an Authentication-Chains protocol which is a lightweight decentralized protocol for IoT authentication based on blockchain distributed ledger. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. This algorithm depends on the adaptability of the concept in the ITSWTCM, I2TSWTCM and M2I2TSWTCM algorithms for affecting the fairness and multiple protocols. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Skype multimedia application traffic analysis on home Unifi network / Siti Fatimah Ramle by Ramle, Siti Fatimah

    Published 2017
    “…Then, Skype traffic model is identified by fitted the raw data. Two parameter Cumulative Distributions Functions (CDF) is generated. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…The proposed method benchmarked with the state-of-the-art methods and achieved comparable results. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model by Jasim, Ahmed Abdulhadi, Idris, Mohd Yamani Idna, Azzuhri, Saaidal Razalli, Issa, Noor Riyadh, Noor, Noorzaily Mohamed, Kakarla, Jagadeesh, Amiri, Iraj Sadegh

    Published 2019
    “…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
    Get full text
    Get full text
    Article
  16. 16

    General purpose search and classification algorithms for distributed information access by Siraj, Fadzilah, Wan Ishak, Wan Hussain

    Published 2000
    “…Users have to visit each URLs even though the page does not suit their requests.Therefore, it is vital to provide efficient and timely Internet search algorithm to ensure the success of distributed services, particularly to facilitate the current and future applications of national information superhighway. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Synchronization algorithm for remote heterogeneous database environment by Imam, A.A., Basri, S.B., Ahmad, R.B.

    Published 2015
    “…In this paper, we proposed a model and a unique algorithm to synchronize data between heterogeneous databases, in order to provide alternative synchronization paths, concurrency in operation and bidirectional mode of data exchange. …”
    Get full text
    Get full text
    Article
  18. 18

    Optimizing timber transportation planning for timber harvesting using bees algorithm in Malaysia by Jamaluddin, Jamhuri, Kamarudin, Norizah, Ismail, Mohd Hasmadi, Ahmad, Siti Azfanizam

    Published 2023
    “…A Bees Algorithm (BA) was proposed to find an optimum TTP for timber extraction, forest road, and landing locations with grid cell-sized 10 m × 10 m and attributed with fixed and variable costs. …”
    Get full text
    Get full text
    Article
  19. 19

    Multi road marking detection system for autonomous car using hybrid- based method by Shah, Khan Bahadur

    Published 2018
    “…Wu dataset that consist of 1208 road images, which were extracted from videos recorded around California, the proposed algorithm performed satisfactorily. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20