Search Results - (( based coding protocol algorithm ) OR ( simulation optimization method algorithm ))

Refine Results
  1. 1

    Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication by JAM'AAH, SUUD

    Published 2021
    “…The limitation of the available works on min-sum based LDPC code decoding algorithm specifically for DF protocol relay system motivated this research. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications by IZZAH NILAMSYUKRIYAH, BUANG, Kartinah, Zen, Syahrul Nizam, Junaini

    Published 2025
    “…Key topics examined include AI-enhanced adaptive data rate (ADR) methods, coding schemes based on the Chinese Remainder Theorem (CRT), and processes utilizing Variable Order Hidden Markov Models (VHMM). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology by Lee, Feng Wei

    Published 2022
    “…It is constructed using coding theory-based hardness assumptions. Since code-based hardness assumptions are the foundation of code-based cryptography, thus, we first investigate various code-based hard problems. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…Station-to-Station protocol is a protocol based on the Diffie-Hellman key exchange to prevent the man-in-the-middle attack by inserting authentication. …”
    Get full text
    Get full text
    Student Project
  7. 7
  8. 8
  9. 9
  10. 10

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Relay suitability based routing protocol for video streaming in vehicular ad-hoc network by Omar Abdulmaged, Hammood

    Published 2022
    “…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Evolutionary algorithm based network coding for optmization of intelligent vehicular ad hoc network by Lee, Chun Hoe

    Published 2017
    “…This project aims to improve the throughput, energy consumption and overhead of vehicular ad hoc network (VANET) by optimising the network coding (NC) using Genetic Algorithm and Particle Swarm Optimisation (GA-PSO). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Optimal forwarding routing protocol in ipv6-based wireless sensor network by Jamil, Ansar

    Published 2009
    “…Currently, a popular routing network protocol in WSNs is not compatible with IP-Based network _and can not provide Internet connection. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimization of turning parameters using genetic algorithm method by Shah Izwandi, Mohd Zawawi

    Published 2008
    “…The simulation based on Genetic Algorithm are successful develop and the optimum parameters values are obtained from the simulation.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing by Rahman, Gohar

    Published 2023
    “…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing by Rahman, Gohar

    Published 2023
    “…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…This thesis proposes and simulates the three novel optimization algorithms to handle DG allocation, different single-objective, and multi-objective OPF problems. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A discrete simulated kalman filter optimizer for combinatorial optimization problems by Suhazri Amrin, Rahmad

    Published 2022
    “…An example of a numerical algorithm is the simulated Kalman filter (SKF). Various method has been introduced as an extension of a numerical algorithm to adapt it to a discrete search space. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Route optimization using shortest path method / Muhamad Faisal Amin Shakri by Shakri, Muhamad Faisal Amin

    Published 2025
    “…Therefore, the effectiveness of route planning is very essential. The method to study route optimization is called shortest path method. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…For EL video packets, an enhanced routing algorithm was proposed to route the Enhance Layer (EL) packets, namely, Energy Sensible and Route Stability Based Routing Protocol (ESRSBRP) which is used over Mobile network. …”
    Get full text
    Get full text
    Get full text
    Thesis