Search Results - (( based encryption path algorithm ) OR ( using rectification learning algorithm ))

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Route optimization security in mobile IPv6 wireless networks: a test-bed experience by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Prioritisation assessment and robust predictive model for a comprehensive medical equipment maintenance using machine learning techniques / Aizat Hilmi Zamzam by Aizat Hilmi, Zamzam

    Published 2022
    “…The development of predictive models for objectives 1 and 2 of this study involves the application of seven supervised machine learning algorithms. The effectiveness of these models is assessed through eleven performance evaluation parameters. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Image orientation watermarking technique for copyright protection by Jasim, Hend Muslim

    Published 2016
    “…In return, a copyright gains its validity based on such robust characteristics. Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
    Get full text
    Get full text
    Get full text
    Thesis