Search Results - (( based encryption path algorithm ) OR ( variable detection path algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Route optimization security in mobile IPv6 wireless networks: a test-bed experience by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A real-time integrated fire detection and alarm (FDA) system for network based building automation by Anwar, Farhat, Islam, Rounakul, Hussain, Sabahat, Rashid, Muhammad Mahbubur, Shaikh, Zuhaib

    Published 2017
    “…Methods/Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    LED based NIR spectroscopy for detection of lard adulteration in palm oil via chemometrics / Katrul Nadia Basri by Basri, Katrul Nadia

    Published 2017
    “…In order to remove the uninformative variables, cumulative adaptive reweighted sampling (CARS) has been performed. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Classification and quantification of palm oil adulteration via portable NIR spectroscopy by Basri, Katrul Nadia, Hussain, Mutia Nurulhusna, Bakar, Jamilah, Sharif, Zaiton, Abdul Khir, Mohd Fared, Zoolfakar, Ahmad Sabirin

    Published 2017
    “…In order to remove the uninformative variables, variable selection using cumulative adaptive reweighted sampling (CARS) has been performed. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Classification and quantification of palm oil adulteration via portable NIR spectroscopy by Basri, Katrul Nadia, Hussain, Mutia Nurulhusna, Bakar, Jamilah, Sharif, Zaiton and, Zoolfakar, Ahmad Sabirin, Mohd Fared Abdul Khir

    Published 2024
    “…In order to remove the uninformative variables, variable selection using cumulative adaptive reweighted sampling (CARS) has been performed. …”
    Article
  8. 8

    Image orientation watermarking technique for copyright protection by Jasim, Hend Muslim

    Published 2016
    “…In return, a copyright gains its validity based on such robust characteristics. Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
    Get full text
    Get full text
    Get full text
    Thesis