Search Results - (( developing messaging research algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing messaging »
- research algorithm »
- implication based »
- java implication »
-
1
The use of people rank technique for data dissemination in opportunistic network
Published 2015“…In this paper, we are going to develop on one of the forwarding algorithm, People Rank algorithm, which is a social-based forwarding algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
2
-
3
-
4
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
Published 2014“…The study shows that the developed algorithms MKPAES and DMAC increase the performance of the WSN and improve the system resistance to attacks on the WSN. …”
Get full text
Get full text
Thesis -
5
Integrated Mobile Spain Model Using Artificial Immune System Algorithms
Published 2024Proceedings Paper -
6
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…Lastly, a comparison is made through simulation between all algorithms developed in this research with previous Zero-based algorithms as well as traditional Heuristic algorithms since equal routing results can be obtained between all algorithms. …”
Get full text
Get full text
Thesis -
7
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
8
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…This has prompted researchers to develop statistical and machine learning based intrusion detection systems for the CAN bus that use various features such as message timing and frequency to detect attacks. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…Thus, the proposed algorithms enhance the performance of the search by reducing redundant messages, increasing the success rate and decreasing latency. …”
Get full text
Get full text
Thesis -
10
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024thesis::doctoral thesis -
11
Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin
Published 2018“…This technique will be tested in order to compare with other research. This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. …”
Get full text
Get full text
Thesis -
12
Survey on language processing algorithm for sign language synthesizer
Published 2017“…This has motivated various research described in this paper. In general, we can divide the main contribution in solving the communication problem of the HSI community into two types, the first involves the development of automatic SL translators which allow the non-HSI communities to understand the messages conveyed by the HSI people, and the second relates to the development of SL synthesizers which allow the non-HSI community to pass their messages to HSI people. …”
Get full text
Get full text
Get full text
Article -
13
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
Published 2014“…We then designed a new compression algorithm developed using ideas from the Huffman coding. …”
Get full text
Get full text
Get full text
Thesis -
14
Genetic algorithm for event scheduling system
Published 2010“…Some researches about another existing Event Alert Sytem are carried to provide more understanding to the system to be developed. …”
Get full text
Get full text
Get full text
Article -
15
Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
Published 2023“…Through the development of a system to improve the security and confidentiality of data in the form of critical messages, this study seeks to provide senders with solutions. …”
Get full text
Get full text
Get full text
Article -
16
Performance enhancement of AIMD algorithm for congestion avoidance and control
Published 2011“…National Chiao Tung University’s network simulation (NCTUns) has been used in this development to compare the new algorithm with the older versions and determine its advantages over the older versions. …”
Get full text
Get full text
Thesis -
17
Routing problem in rectangular mesh network using Dijkstra’s based Greedy method
Published 2018“…In this research, Dijkstra’s algorithm is used to establish the shortest connection for each net. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Routing problem in rectangular mesh network using shortest path based Greedy method
Published 2019“…In this research, Dijkstra's algorithm is used to establish the shortest connection for each net. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud
Published 2007“…One type of encryption is 'one-way hashing function' which consists of several algorithms such as Message Digests (MD), Secure Hash Algorithm (SHA) and RIPEMD etc. …”
Get full text
Get full text
Research Reports -
20
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…Thus, there is a room for further enhancement to develop a routing algorithm as to mitigate the drawbacks with the NCPR. …”
Get full text
Get full text
Get full text
Thesis
