Search Results - _ distribution ((process algorithm) OR (protocol algorithm))
Search alternatives:
- protocol algorithm »
- process algorithm »
-
1
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
Get full text
Get full text
Thesis -
2
New synchronization protocol for distributed system with TCP extension
Published 2013“…Process management is a fundamental problem in distributed systems. …”
Get full text
Get full text
Thesis -
3
Simplified channel authentication algorithm for secure quantum key distribution
Published 2014“…The quantum channel through which a light beam travels and then examined quantum-mechanically is governed by several quantum cryptographic protocols. This paper presents a simplified algorithm of the quantum authentication process (QAP) of the six-state deterministic quantum protocol (6DP). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
A conceptual automated negotiation model for decision making in the construction domain
Published 2023“…Artificial intelligence; Automation; Autonomous agents; Decision making; Distributed computer systems; Intelligent agents; Multi agent systems; Network architecture; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Negotiation protocol; Value management; Software agents…”
Conference Paper -
5
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…The effect of changes in movement (speed) and node density (number of nodes) on the performance of the proposed routing protocols was measured. The performance of ECRP algorithms was compared with other cluster based algorithms. …”
Get full text
Get full text
Thesis -
6
-
7
Performance Analysis of Swarm Intelligence-Based Routing Protocol for Mobile Ad Hoc Network and Wireless Mesh Networks
Published 2009“…Also the main aim of this research is to solve the freezing problem during optimum as well as sub-optimum path discovery process. In this research, Intelligent AntNet based Routing Algorithm (IANRA) is presented for routing in WMNs and MANET to find optimum and near-optimum paths for data packet routing. …”
Get full text
Get full text
Thesis -
8
Encryption method for SCADA security enhancement
Published 2014“…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
9
FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization
Published 2022“…The enhanced and appropriate algorithm should be applied according to the actual environment in the forest. …”
Get full text
Get full text
Get full text
Thesis -
10
Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm
Published 2012“…Meanwhile in LEACH, the cluster head selection was based on distributed algorithm. Both of these protocols was implemented in network simulator to compare the performance. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Traffic management algorithms for LEO satellite networks
Published 2016“…The performances of the proposed algorithms are then compared with the previously developed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
12
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…Therefore, reducing the response time and overhead will enhance the communication process. To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. …”
Get full text
Get full text
Get full text
Thesis -
13
Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links
Published 2014“…In this study, the notion of constructing connected-dominating-set is extended to ad-hoc networks with unidirectional links. An enhanced distributed algorithm is presented that is based on the marking process which is has been introduced in earlier work. …”
Get full text
Get full text
Get full text
Article -
14
Energy Efficient LEACH (EE-LEACH) Routing Algorithm for Wireless Sensor Networks
Published 2019“…Therefore, this research work proposes an energy-efficient LEACH (EE-LEACH) algorithm to elect CHs based on residual energy, RSSI, and random probability to distribute the load evenly among the CHs. …”
Get full text
Get full text
Thesis -
15
Deployment of new dynamic cryptography buffer for SCADA security enhancement
Published 2014“…The DCB contains several fields/sub-fields which have been used during implementation of cryptography algorithm and other information ( or detail) related with protocol security. …”
Get full text
Get full text
Get full text
Article -
16
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Some of these challenges result from the transmission of huge amounts of data in each data sensing period and the complexity of SHM algorithms. Furthermore, in WSNs, the operating system (OS) with its network protocol stack and media access control (MAC) layer protocol play an essential role in managing the scarce resources, data processing and communication. …”
Get full text
Get full text
Thesis -
17
Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach
Published 2022“…In addition, a new image clustering algorithm anticipates the need for largescale serial and parallel processing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…A novel and efficient cluster head selection algorithm (ECHSA) is employed to improve the performance of the cluster head (CH) selection process in clustered WSN. …”
Get full text
Get full text
Article -
19
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
Published 2018“…Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. …”
Get full text
Get full text
Thesis -
20
Multi-dimensional networking and distributed computing services
Published 2012“…The multi-dimensional research issues include wireless and mobility problems, routing protocols and algorithms, resource and service location protocols, performance evaluations of networking systems, ubiquitous systems, context aware ubiquitous environment, mechanisms to improve throughput over wireless links, network management and network security, and other related areas. …”
Get full text
Get full text
Get full text
Article
