Search Results - (( developing internet users algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing internet »
- implication based »
- java implication »
- users algorithm »
- internet users »
-
1
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…It can be automatically or manually control led through the internet/LAN. A user friendly GUI is developed using VISUAL BASIC to interface the user commands with the Robot controller. …”
Get full text
Get full text
Monograph -
3
Simulation Of Token Bucket Algorithm For Network Traffic Performance
Published 2020“…The internet isthe most important medium for users in the cyber world. …”
Get full text
Get full text
Get full text
Article -
4
Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud
Published 2014“…The Internet has rapidly grown due to more online users using to interact with people, communicate, seek jobs, find partners and shop. …”
Get full text
Get full text
Thesis -
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Intelligent DNA signature detection for internet worms
Published 2011“…Internet scanning worms are widely regarded to be a major security threat faced by the Internet community today. …”
Get full text
Get full text
Get full text
Get full text
Monograph -
7
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…Use of Internet enabled mobile devices has facilitated the rapid Use of Internet enabled mobile devices has facilitated the rapid development of location-based services (LBS). …”
Get full text
Get full text
Article -
8
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…This algorithm developed to allow user to receive push notification effectively based on the location of user’s smartphone that can be detected by Bluetooth Smart Ready Technology (BLE). …”
Get full text
Get full text
Thesis -
9
Internet access using encrypted membercard / Muhammad Syafiq Sopian
Published 2021“…The main function of this device is to control input user of client and to also encrypt it with AES algorithm. …”
Get full text
Get full text
Student Project -
10
Review of the machine learning methods in the classification of phishing attack
Published 2019“…This can be seen based on the trend of computer users around the world, whereby they need to connect their computer to the Internet. …”
Get full text
Get full text
Get full text
Article -
11
The development of secure interface system for wi-fi internet access using blended approach of captive portals and key verification techniques / Kamarul Ariffin Abdul Basit … [et a...
Published 2014“…The SiS will then process that information to determine whether the user is a legitimate user or not. The legitimate user will be granted permission and the non-legitimate user will be blocked to use the Internet facilities. …”
Get full text
Get full text
Get full text
Book Section -
12
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…Web-based GIS has been used to distribute road information and provide shortest path analysis on the internet. However, the function of the analysis on the internet is still limited. …”
Get full text
Get full text
Thesis -
13
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…Thus, an interest has developed in having the Internet to provide some degree of Quality of Service (QoS). …”
Get full text
Get full text
Thesis -
14
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
15
Phishing attack detection using machine learning method
Published 2019“…This can be shown based on the trend of every computer user around the world, whereby they need to connect their computer to the Internet. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
16
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…This algorithm is very practical to implement for individuals or for small group communication but unpractical when implemented in a big company where many users can become a bottleneck. …”
Get full text
Get full text
Get full text
Article -
17
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
Published 2024“…User authentication is an essential part of communication in an Internet of Things (IoT) environment. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
-
20
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…Movie Recommendation System is essentially developed for the purpose of producing a movie recommendation list therefore, it is paired with algorithm to provide the desired functionalities and features in the system. …”
Get full text
Get full text
Thesis
