Search Results - (( developing messaging research algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    The use of people rank technique for data dissemination in opportunistic network by Donna, Christen George

    Published 2015
    “…In this paper, we are going to develop on one of the forwarding algorithm, People Rank algorithm, which is a social-based forwarding algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2
  3. 3
  4. 4

    Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol by Al-Alak, Saif M. Kh.

    Published 2014
    “…The study shows that the developed algorithms MKPAES and DMAC increase the performance of the WSN and improve the system resistance to attacks on the WSN. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks by Raja Mohd Auzar, Tengku Dian Shahida

    Published 2009
    “…Lastly, a comparison is made through simulation between all algorithms developed in this research with previous Zero-based algorithms as well as traditional Heuristic algorithms since equal routing results can be obtained between all algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Using streaming data algorithm for intrusion detection on the vehicular controller area network by Sharmin, Shaila, Mansor, Hafizah, Abdul Kadir, Andi Fitriah, Abdul Aziz, Normaziah

    Published 2022
    “…This has prompted researchers to develop statistical and machine learning based intrusion detection systems for the CAN bus that use various features such as message timing and frequency to detect attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks by Barjini, Hassan

    Published 2012
    “…Thus, the proposed algorithms enhance the performance of the search by reducing redundant messages, increasing the success rate and decreasing latency. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin by Saifuddin, Nur Fattin Nadhrah

    Published 2018
    “…This technique will be tested in order to compare with other research. This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Survey on language processing algorithm for sign language synthesizer by Maarif, Haris Al Qodri, Akmeliawati, Rini, Gunawan, Teddy Surya

    Published 2017
    “…This has motivated various research described in this paper. In general, we can divide the main contribution in solving the communication problem of the HSI community into two types, the first involves the development of automatic SL translators which allow the non-HSI communities to understand the messages conveyed by the HSI people, and the second relates to the development of SL synthesizers which allow the non-HSI community to pass their messages to HSI people. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Reconstructing applicable chaotic Baptista-type symmetric cryptosystem by Daud, Muhamad Azlan

    Published 2014
    “…We then designed a new compression algorithm developed using ideas from the Huffman coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Genetic algorithm for event scheduling system by Hasan Basari, Abd Samad, Hussin, Burairah, Jalal, Siti Musliza, Mohd Isa, Nabihah

    Published 2010
    “…Some researches about another existing Event Alert Sytem are carried to provide more understanding to the system to be developed. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm by Nurul Adha, Oktarini Saputri, Novita Epa, Sari

    Published 2023
    “…Through the development of a system to improve the security and confidentiality of data in the form of critical messages, this study seeks to provide senders with solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Performance enhancement of AIMD algorithm for congestion avoidance and control by Jasem, Hayder Natiq

    Published 2011
    “…National Chiao Tung University’s network simulation (NCTUns) has been used in this development to compare the new algorithm with the older versions and determine its advantages over the older versions. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Routing problem in rectangular mesh network using Dijkstra’s based Greedy method by Noraziah, Adzhar, Shaharuddin, Salleh, Yuhani, Yusof, Muhammad Azrin, Ahmad

    Published 2018
    “…In this research, Dijkstra’s algorithm is used to establish the shortest connection for each net. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Routing problem in rectangular mesh network using shortest path based Greedy method by Noraziah, Adzhar, Shaharuddin, Salleh, Yuhani, Yusof, Muhammad Azrin, Ahmad

    Published 2019
    “…In this research, Dijkstra's algorithm is used to establish the shortest connection for each net. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud by Mohd Daud, Mohd Rosli

    Published 2007
    “…One type of encryption is 'one-way hashing function' which consists of several algorithms such as Message Digests (MD), Secure Hash Algorithm (SHA) and RIPEMD etc. …”
    Get full text
    Get full text
    Research Reports
  20. 20

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…Thus, there is a room for further enhancement to develop a routing algorithm as to mitigate the drawbacks with the NCPR. …”
    Get full text
    Get full text
    Get full text
    Thesis