Search Results - (( developing integration protocol algorithm ) OR ( java applications using algorithm ))
Search alternatives:
- developing integration »
- integration protocol »
- protocol algorithm »
- applications using »
- java applications »
- using algorithm »
-
1
Implementation of Station-To-Station (STS) protocol using Elliptic Curve Digital Signature Al Algorithm / Muhammad Faris Fakhri Rozi, Alya Syuhada Ismail and Emylia Suhaimi
Published 2018“…This protocol will provide an element of authentication element and data integrity in the system. …”
Get full text
Get full text
Student Project -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. …”
Get full text
Get full text
Thesis -
4
Software Development For Conversion Of Ip To Wireless Atm (Watm)
Published 2002“…In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. …”
Get full text
Get full text
Thesis -
5
-
6
Cohesive token passing algorithm utilizing software agents
Published 2010“…The communications domain has utilized the implementation of protocols for a wide spectrum of applications. This encompasses Medium Access Control (MAC) protocols. …”
Get full text
Get full text
Article -
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design.
Published 2006“…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
Get full text
Patent -
9
Implementation of the Merkle-Hellman knapsack cryptosystem into station-to-station protocol / Nurzhulaika Yahya, Noor Izzah Agil and Nur ‘Afini Nordin
Published 2023“…The station-to-station protocol is integrated with the Merkle-Hellman knapsack cryptosystem for a particular use or application when the Merkle-Hellman knapsack cryptosystem is included into the protocol. …”
Get full text
Get full text
Student Project -
10
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
11
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol
Published 2006“…The study has done several analysis and research to improve R-IWDMTC protocol to support quality and services (QoS) (differentiation and integration services). …”
Get full text
Get full text
Conference or Workshop Item -
13
Investigative analysis of clustering routing protocols for scalable sensor networks
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
14
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
The integration of Voip and e-Learning system in a collaborative learning environment / Ahmad Zulkhair Zakaria
Published 2006“…Through the new assigned module, NBPL’s users can view all the online NBPL’s Skype user and also can click at the username to contact the user via VoIP call managed by the Skype application. Instead of developing the integration module, this project also run an analysis on the effect of VoIP based on UDP protocol and also proposed an algorithm to search an online NBPL’s Skype user.…”
Get full text
Get full text
Student Project -
16
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
17
Development of wireless data acquisiton system using LoRa technology for construction of PID control system
Published 2025text::Thesis -
18
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
19
Agro-ento bioinformation: towards the edge of reality
Published 2002“…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
Get full text
Get full text
Inaugural Lecture -
20
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
