Search Results - (( developing internet force algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    SENSORY EXPERT: DEVICE FOR SENSORY TEST by MOHD ADZMI, MOHD DANIAL AIMAN

    Published 2018
    “…The study is divided into three stages which are developing heating element stage, developing algorithm for heat sensing stage and developing algorithm for data transmitting stage. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…Instead the routing protocol should be reactive, thus only calculate routes upon receiving a specific request. The Internet Engineering Task Force (IEFT) currently has a working group called mobile Ad hoc network (MANET) that is working on routing specification for Ad hoc networks. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Mode division multiplexing zero forcing equalisation scheme using LU factorization by Mohamed, Ahmed Sayed

    Published 2016
    “…These technique mainly rely on Least Mean Squared (LMS) and Recursive Least Squared (RLS) algorithms. The purpose of this study is to introduce a Zero Forcing LU-based equalization scheme for MDM. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    RaspyAir: self-monitoring system for wireless intrusion detection using raspberry pi / Mohd Nizam Osman and Mohd Syafiq Aiman Mohamad Zulrahim by Osman, Mohd Nizam, Mohammad Zulrahim, Mohd Syafiq Aiman

    Published 2016
    “…This system was implemented using misuse detection approach, which is hybridization of tShark and Airodump-ng to capture the possibility of the traffic in the wireless environment. The brute-force algorithm is used to filter the traffic using signature based detection technique. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Multistage quality control in manufacturing process using blockchain with machine learning technique by Gu, J., Zhao, L., Yue, X., Arshad, N.I., Mohamad, U.H.

    Published 2023
    “…The demand for predictive machine reliability and quality drives the development of intelligent manufacturing technologies. …”
    Get full text
    Get full text
    Article