Search Results - (( developing internet application algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Algorithm for the legal regulation of internet financial crime by Ambaras Khan, Hanna, Ab. Rahman, Suhaimi, Xinxin, Mao

    Published 2024
    “…Further research is proposed to delve deeper into the application of these algorithms in real-world scenarios and explore additional methods to enhance the prevention and management of Internet financial crime.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…This paper present an analysis of inbound internet traffic and development of Adaptive Policing and Shaping Algorithms on inbound internet traffic and fitted to traffic model. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…This paper present an analysis of inbound internet traffic and development of Adaptive Policing and Shaping Algorithms on inbound internet traffic and fitted to traffic model. …”
    Get full text
    Get full text
    Article
  6. 6

    An Effective Fast Searching Algorithm for Internet Crawling Usage by Chia, Zhen Hon, Nor Azhar, Ahmad

    Published 2016
    “…The search algorithm is a crucial part in any internet applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…Thus, an interest has developed in having the Internet to provide some degree of Quality of Service (QoS). …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design. by Khatun, Sabira

    Published 2006
    “…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
    Get full text
    Patent
  16. 16
  17. 17

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  20. 20

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item