Search Results - (( develop processing protocol algorithm ) OR ( java application design algorithm ))
Search alternatives:
- protocol algorithm »
- application design »
- java application »
- design algorithm »
- develop »
- processing »
-
1
Development of open platform controller for step-NC compliant CNC system
Published 2020“…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
A modification of Shamir's Three-Pass protocol by implementing one-time pad algorithm / Nur Khairunnisa' Kusman, Nurul Hanis Abd Rashid and An Nur Ameera Zamani
Published 2019“…As a result, this study success to develop the algorithm by implemented one-time pad in Shamir's three-pass protocol. …”
Get full text
Get full text
Student Project -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…Thus, the LDPC code encoder model is developed to identify a low complexity encoding algorithm of LDPC code for the DF protocol relay system. …”
Get full text
Get full text
Get full text
Thesis -
6
Cohesive token passing algorithm utilizing software agents
Published 2010“…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
Get full text
Get full text
Article -
7
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…The first step of the proposed protocol involves the development of an energy efficient clustering algorithm which is appropriate for WSN with a sparse density topology. …”
Get full text
Get full text
Thesis -
8
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
9
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…The resulting approach can be further improved via continuous research and development (R&D) to produce a more reliable and resilient protocol. …”
Get full text
Get full text
Final Year Project -
10
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…The resulting approach can be further improved via continuous research and development (R&D) to produce a more reliable and resilient protocol. …”
Get full text
Get full text
Final Year Project -
11
-
12
-
13
-
14
Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks
Published 2016“…The new method is called the Daddy Long-Legs Algorithm (PGO-DLLA), which modifies the standard AODV and optimizes the routing process. …”
Get full text
Get full text
Get full text
Thesis -
15
Agro-ento bioinformation: towards the edge of reality
Published 2002“…These protocols, algorithms, and visualisations undergo dynamic incubation processes to produce the end product, which is bioinformation. …”
Get full text
Get full text
Inaugural Lecture -
16
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
17
Computational model for energy aware TDMA-based MAC protocol for wireless sensor network system
Published 2007“…This paper proposes a novel approach that tries to reduce idle energy consumption by implementing active-sleep algorithm named energy aware A-MAC protocol. The result from the computational model shows that the algorithm can prolong the network lifetime due to efficiency in energy consumption from time slot management.…”
Get full text
Get full text
Conference or Workshop Item -
18
A protocol for developing a classification system of mosquitoes using transfer learning
Published 2022“…Transfer learning is a type of machine learning that is viable and durable in image classification with limited training images. This protocol aims to develop step-by-step procedure in developing a classification system with transfer learning algorithm for mosquito, we demonstrate the protocol to classify two species of Aedes mosquito - Aedes aegypti L. and Aedes albopitus L, but user can adopt the protocol for higher number of species classification. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Encryption method for SCADA security enhancement
Published 2014“…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article
