Search Results - (( developing online protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- protocol algorithm »
- developing online »
- implication based »
- java implication »
- online protocol »
-
1
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Research in secure data transfer on network layer has been discussed in detail on the importance to have secure Internet protocol in E-Commerce environment. This particular research successfully produced a protocol to suit AES encryption algorithm in Internet Protocol Security (IPSec).…”
Get full text
Get full text
Monograph -
2
-
3
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…The key element in this approach is a modular treatment of the authentication problem in cryptographic protocols; this applies to the definition of security, to the design of the protocols, and to their analysis. …”
Get full text
Get full text
Thesis -
4
The integration of Voip and e-Learning system in a collaborative learning environment / Ahmad Zulkhair Zakaria
Published 2006“…Instead of developing the integration module, this project also run an analysis on the effect of VoIP based on UDP protocol and also proposed an algorithm to search an online NBPL’s Skype user.…”
Get full text
Get full text
Student Project -
5
A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus
Published 2023“…This thesis presents a new algorithm for output prediction and online monitoring in a Grid-Connected Photovoltaic (GCPV) system based on an artificial neural network. …”
Get full text
Get full text
Thesis -
6
-
7
Skype multimedia application traffic analysis on home Unifi network / Siti Fatimah Ramle
Published 2017“…This study is significant in developing a dynamic committed access rate algorithms line which would benefits the broadband network users.…”
Get full text
Get full text
Thesis -
8
Video traffic analysis on Unifi broadband network / Laina Sofia Mahamad
Published 2017“…Thirdly, to identify best traffic model based on fitted model in developing network traffic bandwidth control algorithms. …”
Get full text
Get full text
Thesis -
9
-
10
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
11
Recommendations Related To Wheeze Sound Data Acquisition
Published 2018“…In the field of computerized respiratory sounds,a reliable data set with a sufficient number of subjects is required for the development of wheeze detection algorithm or for further analysis.Validated and accurate data is a critical issue in the field of research.In this study,the protocol related to wheeze sound data acquisition is discussed.Previously,most articles focused on wheeze detection or its parametric analysis,but no consideration was given to data acquisition.Second major purpose of this study is to exhibit particulars of our dataset which was attained for future analysis.We compile a database with a sufficient and reliable number of cases with all essential details,in contrast to commercially available wheeze sound data used for research,freely available online data on websites and data used to train medical students for auscultation.…”
Get full text
Get full text
Get full text
Article -
12
Multi-dimensional networking and distributed computing services
Published 2012“…The multi-dimensional research issues include wireless and mobility problems, routing protocols and algorithms, resource and service location protocols, performance evaluations of networking systems, ubiquitous systems, context aware ubiquitous environment, mechanisms to improve throughput over wireless links, network management and network security, and other related areas. …”
Get full text
Get full text
Get full text
Article -
13
Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic
Published 2012“…The rapid development of Internet increases the writers of blog sites. …”
Get full text
Get full text
Get full text
Thesis -
14
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Thus, the users are able to make a phone call, send messages using variety of application such as Whatsapp and Line, send email, serving websites, accessing maps and handling some daily tasks via online using online banking, online shopping and online meetings via video conferences. …”
Get full text
Get full text
Thesis -
15
Development of open platform controller for step-NC compliant CNC system
Published 2020“…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
Get full text
Get full text
Get full text
Get full text
Thesis
