Search Results - (( developing internet users algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    An Effective Fast Searching Algorithm for Internet Crawling Usage by Chia, Zhen Hon, Nor Azhar, Ahmad

    Published 2016
    “…The search algorithm is a crucial part in any internet applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…It can be automatically or manually control led through the internet/LAN. A user friendly GUI is developed using VISUAL BASIC to interface the user commands with the Robot controller. …”
    Get full text
    Get full text
    Monograph
  3. 3

    Simulation Of Token Bucket Algorithm For Network Traffic Performance by Yusof, Robiah, Mat Nawi, Nor Afifah

    Published 2020
    “…The internet isthe most important medium for users in the cyber world. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud by Mat Daud, Nur Shafikah

    Published 2014
    “…The Internet has rapidly grown due to more online users using to interact with people, communicate, seek jobs, find partners and shop. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Internet scanning worms are widely regarded to be a major security threat faced by the Internet community today. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  7. 7

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…Use of Internet enabled mobile devices has facilitated the rapid Use of Internet enabled mobile devices has facilitated the rapid development of location-based services (LBS). …”
    Get full text
    Get full text
    Article
  8. 8

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…This algorithm developed to allow user to receive push notification effectively based on the location of user’s smartphone that can be detected by Bluetooth Smart Ready Technology (BLE). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Internet access using encrypted membercard / Muhammad Syafiq Sopian by Sopian, Muhammad Syafiq

    Published 2021
    “…The main function of this device is to control input user of client and to also encrypt it with AES algorithm. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Review of the machine learning methods in the classification of phishing attack by Jupin, John Arthur, Sutikno, Tole, Mohd Arfian, Ismail, Mohd Saberi, Mohamad, Shahreen, Kasim, Deris, Stiawan

    Published 2019
    “…This can be seen based on the trend of computer users around the world, whereby they need to connect their computer to the Internet. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    The development of secure interface system for wi-fi internet access using blended approach of captive portals and key verification techniques / Kamarul Ariffin Abdul Basit … [et a... by Abdul Basit, Kamarul Ariffin, Awang, Norkhushaini, Darus, Mohammad Yusof, Mohd Ali, Fakariah Hani

    Published 2014
    “…The SiS will then process that information to determine whether the user is a legitimate user or not. The legitimate user will be granted permission and the non-legitimate user will be blocked to use the Internet facilities. …”
    Get full text
    Get full text
    Get full text
    Book Section
  12. 12

    Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software by Nik Yusoff, Nik Mohd Ramli

    Published 2014
    “…Web-based GIS has been used to distribute road information and provide shortest path analysis on the internet. However, the function of the analysis on the internet is still limited. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…Thus, an interest has developed in having the Internet to provide some degree of Quality of Service (QoS). …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…This can be shown based on the trend of every computer user around the world, whereby they need to connect their computer to the Internet. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain by Muhammad, Norhidayah, Mohamad Zain, Jasni

    Published 2019
    “…This algorithm is very practical to implement for individuals or for small group communication but unpractical when implemented in a big company where many users can become a bottleneck. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System by Chiadighikaobi, Ikenna Rene

    Published 2024
    “…User authentication is an essential part of communication in an Internet of Things (IoT) environment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Movie recommendation system / Najwa Syamimie Hasnu by Hasnu, Najwa Syamimie

    Published 2020
    “…Movie Recommendation System is essentially developed for the purpose of producing a movie recommendation list therefore, it is paired with algorithm to provide the desired functionalities and features in the system. …”
    Get full text
    Get full text
    Thesis