Search Results - (( data internet application algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- application algorithm »
- internet application »
- implication based »
- java implication »
- data internet »
-
1
Algorithm for the legal regulation of internet financial crime
Published 2024“…Data processing for criminal acts on Internet finance platforms is crucial, with the utilization of random forest algorithms, including Decision tree and Bagging integration algorithms. …”
Get full text
Get full text
Get full text
Article -
2
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…This paper present an analysis of inbound internet traffic and development of Adaptive Policing and Shaping Algorithms on inbound internet traffic and fitted to traffic model. …”
Get full text
Get full text
Thesis -
3
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
4
Real-time time series error-based data reduction for internet-of-things applications
Published 2018Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
6
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…The Internet Protocol Security (IPSec) is a standard-based method that being used to protect the information that traverse in the Internet networking without expensive cost or complex modification on Internet application itself. …”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
-
10
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Thesis -
11
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…The application of the Internet of Things (IoT) is increasing to almost all aspects of human endevour. …”
Get full text
Get full text
Thesis -
12
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
13
-
14
Content caching in ICN using Bee-Colony optimization algorithm
Published 2015Get full text
Get full text
Get full text
Article -
15
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…This paper present an analysis of inbound internet traffic and development of Adaptive Policing and Shaping Algorithms on inbound internet traffic and fitted to traffic model. …”
Get full text
Get full text
Article -
16
A dynamic replication aware load balanced scheduling for data grids in distributed environments of internet of things
Published 2018“…Moreover, it becomes even more challenging in the highly dynamic and distributed environment of the Internet of Things (IoT). Replication is considered a key optimization technique in data grids. …”
Get full text
Get full text
Article -
17
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique for Video Transmission
Published 2011“…The new algorithm is capable of producing a high data rate and at the same time a better quantization parameter (QP) stability video sequence. …”
Get full text
Get full text
Get full text
Thesis -
20
Cryptographic Algorithm Using Matrix Inversion as Data Protection
Published 2011Get full text
Get full text
Get full text
Article
