Search Results - (( developing internet force algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing internet »
- implication based »
- java implication »
- force algorithm »
- internet force »
-
1
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. …”
Get full text
Get full text
Get full text
Thesis -
2
SENSORY EXPERT: DEVICE FOR SENSORY TEST
Published 2018“…The study is divided into three stages which are developing heating element stage, developing algorithm for heat sensing stage and developing algorithm for data transmitting stage. …”
Get full text
Get full text
Final Year Project -
3
-
4
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
Published 2006“…Instead the routing protocol should be reactive, thus only calculate routes upon receiving a specific request. The Internet Engineering Task Force (IEFT) currently has a working group called mobile Ad hoc network (MANET) that is working on routing specification for Ad hoc networks. …”
Get full text
Get full text
Thesis -
5
The development of secure interface system for wi-fi internet access using blended approach of captive portals and key verification techniques / Kamarul Ariffin Abdul Basit … [et a...
Published 2014“…Our approach should force all users in the environment to register in our SiS and get an electronic key before they have the permission to access the Internet. …”
Get full text
Get full text
Get full text
Book Section -
6
Mode division multiplexing zero forcing equalisation scheme using LU factorization
Published 2016“…These technique mainly rely on Least Mean Squared (LMS) and Recursive Least Squared (RLS) algorithms. The purpose of this study is to introduce a Zero Forcing LU-based equalization scheme for MDM. …”
Get full text
Get full text
Get full text
Thesis -
7
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
8
RaspyAir: self-monitoring system for wireless intrusion detection using raspberry pi / Mohd Nizam Osman and Mohd Syafiq Aiman Mohamad Zulrahim
Published 2016“…This system was implemented using misuse detection approach, which is hybridization of tShark and Airodump-ng to capture the possibility of the traffic in the wireless environment. The brute-force algorithm is used to filter the traffic using signature based detection technique. …”
Get full text
Get full text
Get full text
Article -
9
Multistage quality control in manufacturing process using blockchain with machine learning technique
Published 2023“…The demand for predictive machine reliability and quality drives the development of intelligent manufacturing technologies. …”
Get full text
Get full text
Article
