Search Results - (( developing integration protocol algorithm ) OR ( java application tools algorithm ))
Search alternatives:
- developing integration »
- integration protocol »
- protocol algorithm »
- application tools »
- java application »
- tools algorithm »
-
1
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
2
-
3
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
4
Implementation of Station-To-Station (STS) protocol using Elliptic Curve Digital Signature Al Algorithm / Muhammad Faris Fakhri Rozi, Alya Syuhada Ismail and Emylia Suhaimi
Published 2018“…This protocol will provide an element of authentication element and data integrity in the system. …”
Get full text
Get full text
Student Project -
5
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
6
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. …”
Get full text
Get full text
Thesis -
7
Software Development For Conversion Of Ip To Wireless Atm (Watm)
Published 2002“…In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. …”
Get full text
Get full text
Thesis -
8
Cohesive token passing algorithm utilizing software agents
Published 2010“…The communications domain has utilized the implementation of protocols for a wide spectrum of applications. This encompasses Medium Access Control (MAC) protocols. …”
Get full text
Get full text
Article -
9
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
10
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design.
Published 2006“…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
Get full text
Patent -
12
Implementation of the Merkle-Hellman knapsack cryptosystem into station-to-station protocol / Nurzhulaika Yahya, Noor Izzah Agil and Nur ‘Afini Nordin
Published 2023“…The station-to-station protocol is integrated with the Merkle-Hellman knapsack cryptosystem for a particular use or application when the Merkle-Hellman knapsack cryptosystem is included into the protocol. …”
Get full text
Get full text
Student Project -
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol
Published 2006“…The study has done several analysis and research to improve R-IWDMTC protocol to support quality and services (QoS) (differentiation and integration services). …”
Get full text
Get full text
Conference or Workshop Item -
16
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
Get full text
Get full text
Thesis -
17
-
18
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Investigative analysis of clustering routing protocols for scalable sensor networks
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
20
The integration of Voip and e-Learning system in a collaborative learning environment / Ahmad Zulkhair Zakaria
Published 2006“…Through the new assigned module, NBPL’s users can view all the online NBPL’s Skype user and also can click at the username to contact the user via VoIP call managed by the Skype application. Instead of developing the integration module, this project also run an analysis on the effect of VoIP based on UDP protocol and also proposed an algorithm to search an online NBPL’s Skype user.…”
Get full text
Get full text
Student Project
