Search Results - (( developing internet named algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH by Ngo, Lip Chee

    Published 2014
    “…Thus, much work need to be pumped into a newer and more effective alternative namely IP/MPLS. An upgrade of support node gateways and a network transmission algorithm are key elements of the project. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH by Ngo, Lip Chee

    Published 2014
    “…Thus, much work need to be pumped into a newer and more effective alternative namely IP/MPLS. An upgrade of support node gateways and a network transmission algorithm are key elements of the project. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Cognitive selection mechanism performance in IEEE 802.11 WLAN by Hashim, Wahidah, Ismail, Ahmad Fadzil, Ghafar, Nadratul, Dzulkifly, Sumayyah

    Published 2013
    “…A heuristic selection model was developed namely Evaluative AP Selection which used LINUX Bash script programming whilst the internet connection speed test was ran by means of PHP script. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Efficiency and fairness of new-additive increase multiplicative decrease congestion avoidance and control algorithm by Jasem, Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, Subramaniam, Shamala

    Published 2011
    “…In addition, to evaluate the effect of using the AIMD algorithm after its development to measure the efficiency and fairness and find new enhancement results for our approach, which named as the New-AIMD algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…A system with security technique named Arbitrary Random Security Algorithm (ARSA) and a one-to-one multithreading model need to be developed in order to accelerate the authentication response time of MPM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…With the rapid development of the Internet, preserving the security of confidential data has become a challenging issue. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    The development of semantic meta-database: an ontology based semantic integration of biological databases by Samsudin, Ruhaidah, Deris, Safaai, Othman, Muhammad Razib, Md. Illias, Rosli

    Published 2007
    “…In this study, a Gene Ontology (GO) based protein sequence annotation tool named extended UTMGO is developed to meet these features. …”
    Get full text
    Get full text
    Monograph
  11. 11
  12. 12

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  13. 13

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Elastic-TCP: flexible congestion control algorithm to adapt for high-BDP networks by Alrshah, Mohamed Alhadi Mahmoud, Al-Moqri, Mohamed A., Othman, Mohamed

    Published 2019
    “…In order to increase TCP flexibility to adapt for high-BDP networks, we propose a new delay-based and RTT-independent congestion control algorithm (CCA), namely Elastic-TCP. It mainly contributes the novel window-correlated weighting function (WWF) to increase TCP bandwidth utilization over high-BDP networks. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Audio files comparator using wavelet transform and similarity metrics by Lee, Da Long

    Published 2025
    “…This project is a development-based project revolving around signal processing. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    The integration of Voip and e-Learning system in a collaborative learning environment / Ahmad Zulkhair Zakaria by Zakaria, Ahmad Zulkhair

    Published 2006
    “…A new technology which named as Voice over Internet Protocol brings a new dimension in the communication technology. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  20. 20

    Framework for mining XML format business process log data by Ang, Jin Sheng

    Published 2024
    “…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
    Get full text
    Get full text
    Thesis