Search Results - (( _ integration protocol algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…IoT integrates and connects intelligent devices or objects with varied architectures and resources. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An improved energy-efficient clustering protocol to prolong the wireless sensor network lifetime by Alhmood, Ali Abdul-Hussian Hassan

    Published 2021
    “…Then, the balanced-static clusters are formed on the basis of a modified Fuzzy C-means algorithm by integrating this algorithm with a centralized mechanism to reduce and balance the energy consumption of the nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm by Hintaw, Ahmed Jameel

    Published 2023
    “…Therefore, this research work presented an integrated scheme known as “Secure Hybrid Scheme”, to protect the MQTT protocol against any exploitations that might result in sophisticated cyberattacks. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Advanced Multiple Access Schemes for Multimedia Traffic over Wireless Channels by Habaebi, Mohamed Hadi

    Published 2001
    “…Finally, an algorithm is proposed to integrate these algorithms to provide ubiquitous wireless ATM services. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…The communications domain has utilized the implementation of protocols for a wide spectrum of applications. This encompasses Medium Access Control (MAC) protocols. …”
    Get full text
    Get full text
    Article
  10. 10

    Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.] by Mat Abu, Nur Ainaa, Mohamad Sarif, Siti Nurfazliana, Mohammad Zuki, Intan Nur Athirah, Udin, Md Nizam

    Published 2021
    “…Thus, in this paper propose the new algorithm in Station to Station (STS) protocol by implementing Lamport digital signature to provide the authentication in DHKE protocol.…”
    Get full text
    Get full text
    Monograph
  11. 11

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    GSAR: Greedy Stand-Alone Position-Based Routing protocol to avoid hole problem occurance in Mobile Ad Hoc Networks by Al-Shugran, Mahmoud Ali

    Published 2014
    “…Both mechanisms were integrated into the conventional GFS to form Greedy Stand-Alone Routing (GSAR) protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  16. 16

    On the security of digital signature protocol based on iterated function systems. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2011
    “…Hash functions are used within digital signature schemes to provide data integrity for cryptographic applications. In this paper, we take a closer look at the security and efficiency of the digital signature protocol based on fractal maps. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Effective routing protocol for wireless sensor networks using CRT-leach algorithm / Kamaldeen Ayodele Raji, Ayisat Wuraola Asaju-Gbolagade and Kazeem Alagbe Gbolagade by Ayodele Raji, Kamaldeen, Asaju-Gbolagade, Ayisat Wuraola, Gbolagade, Kazeem Alagbe

    Published 2021
    “…Chinese Remainder Theorem (CRT)- based packet splitting integrated with Low-Energy Adaptive Clustering Hierarchy (LEACH) algorithm routing protocol was proposed so as to decrease vitality utilization during correspondence and improve message dependability in WSNs. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Software Development For Conversion Of Ip To Wireless Atm (Watm) by Sudhakar, Swarnappa Clement

    Published 2002
    “…In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. …”
    Get full text
    Get full text
    Thesis
  19. 19

    QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol by Addie Irawan, Hashim, R. Badlishah, Ahmad

    Published 2006
    “…The study has done several analysis and research to improve R-IWDMTC protocol to support quality and services (QoS) (differentiation and integration services). …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Adaptive reservation TDMA protocol for wireless multimedia traffic by Habaebi, Mohamed Hadi, Mohd Ali, Borhanuddin

    Published 2001
    “…Integration of CBR, voice, VBR, data and control traffic over the wireless ATM channel using the proposed AR-TDMA protocol is considered in the paper. …”
    Get full text
    Get full text
    Get full text
    Article