Search Results - (( developing internet named algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing internet »
- implication based »
- java implication »
- named algorithm »
- internet named »
-
1
-
2
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…Thus, much work need to be pumped into a newer and more effective alternative namely IP/MPLS. An upgrade of support node gateways and a network transmission algorithm are key elements of the project. …”
Get full text
Get full text
Final Year Project -
3
-
4
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…Thus, much work need to be pumped into a newer and more effective alternative namely IP/MPLS. An upgrade of support node gateways and a network transmission algorithm are key elements of the project. …”
Get full text
Get full text
Final Year Project -
5
Cognitive selection mechanism performance in IEEE 802.11 WLAN
Published 2013“…A heuristic selection model was developed namely Evaluative AP Selection which used LINUX Bash script programming whilst the internet connection speed test was ran by means of PHP script. …”
Get full text
Get full text
Get full text
Article -
6
Efficiency and fairness of new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2011“…In addition, to evaluate the effect of using the AIMD algorithm after its development to measure the efficiency and fairness and find new enhancement results for our approach, which named as the New-AIMD algorithm. …”
Get full text
Get full text
Get full text
Article -
7
-
8
A security payment model for financial payment using mykad
Published 2011“…A system with security technique named Arbitrary Random Security Algorithm (ARSA) and a one-to-one multithreading model need to be developed in order to accelerate the authentication response time of MPM. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…With the rapid development of the Internet, preserving the security of confidential data has become a challenging issue. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…In this study, a Gene Ontology (GO) based protein sequence annotation tool named extended UTMGO is developed to meet these features. …”
Get full text
Get full text
Monograph -
11
-
12
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
13
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
14
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
15
Elastic-TCP: flexible congestion control algorithm to adapt for high-BDP networks
Published 2019“…In order to increase TCP flexibility to adapt for high-BDP networks, we propose a new delay-based and RTT-independent congestion control algorithm (CCA), namely Elastic-TCP. It mainly contributes the novel window-correlated weighting function (WWF) to increase TCP bandwidth utilization over high-BDP networks. …”
Get full text
Get full text
Get full text
Article -
16
Audio files comparator using wavelet transform and similarity metrics
Published 2025“…This project is a development-based project revolving around signal processing. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
The integration of Voip and e-Learning system in a collaborative learning environment / Ahmad Zulkhair Zakaria
Published 2006“…A new technology which named as Voice over Internet Protocol brings a new dimension in the communication technology. …”
Get full text
Get full text
Student Project -
18
-
19
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
20
Framework for mining XML format business process log data
Published 2024“…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
Get full text
Get full text
Thesis
