Search Results - (( data integration protocol algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…Routing algorithms must ensure the data transmission in an efficient way, having proper knowledge of the IoT system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm by Hintaw, Ahmed Jameel

    Published 2023
    “…Therefore, this research work presented an integrated scheme known as “Secure Hybrid Scheme”, to protect the MQTT protocol against any exploitations that might result in sophisticated cyberattacks. …”
    Get full text
    Get full text
    Thesis
  8. 8

    QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol by Addie Irawan, Hashim, R. Badlishah, Ahmad

    Published 2006
    “…The protocol has been introduced by Salvador et al. (Extended via Multi-protocol Label Switching (MPLS)) provides connection-oriented setup and multicast tree construction control for Optical Internet data forwarding in the network backbone area. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Software Development For Conversion Of Ip To Wireless Atm (Watm) by Sudhakar, Swarnappa Clement

    Published 2002
    “…In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. …”
    Get full text
    Get full text
    Thesis
  14. 14

    On the security of digital signature protocol based on iterated function systems. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2011
    “…Hash functions are used within digital signature schemes to provide data integrity for cryptographic applications. In this paper, we take a closer look at the security and efficiency of the digital signature protocol based on fractal maps. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…In IoT network, the malicious intruders can exploit the routing system of the standardized routing protocol, e.g., RPL (The Routing Protocol for Low-Power and Lossy Networks), that does not observe the node’s routing behavior prior to data forwarding, and can launch various forms of routing attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Adaptive reservation TDMA protocol for wireless multimedia traffic by Habaebi, Mohamed Hadi, Mohd Ali, Borhanuddin

    Published 2001
    “…Integration of CBR, voice, VBR, data and control traffic over the wireless ATM channel using the proposed AR-TDMA protocol is considered in the paper. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Adaptive reservation TDMA protocol for wireless multimedia traffic by Habaebi, Mohamed Hadi, Mohd Ali, Borhanuddin

    Published 2001
    “…Integration of CBR, voice, VBR, data and control traffic over the wireless ATM channel using the proposed AR-TDMA protocol is considered in the paper. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…This particular research successfully produced a protocol to suit AES encryption algorithm in Internet Protocol Security (IPSec).…”
    Get full text
    Get full text
    Monograph
  19. 19

    Implementation of Schnorr Digital Signature into Station-to-Station Protocol / Nurul Mahira Budin, Nor Hafikah Othman and Nur Izzatie Farhana Ahmad Fauzan by Budin, Nurul Mahira, Othman, Nor Hafikah, Ahmad Fauzan, Nur Izzatie Farhana

    Published 2018
    “…As a recommendation, in order to improve this project, the researchers may provide data integrity by using Hashing algorithm.…”
    Get full text
    Get full text
    Student Project
  20. 20