Search Results - (( developing online protocol algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…Research in secure data transfer on network layer has been discussed in detail on the importance to have secure Internet protocol in E-Commerce environment. This particular research successfully produced a protocol to suit AES encryption algorithm in Internet Protocol Security (IPSec).…”
    Get full text
    Get full text
    Monograph
  2. 2
  3. 3

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…The key element in this approach is a modular treatment of the authentication problem in cryptographic protocols; this applies to the definition of security, to the design of the protocols, and to their analysis. …”
    Get full text
    Get full text
    Thesis
  4. 4

    The integration of Voip and e-Learning system in a collaborative learning environment / Ahmad Zulkhair Zakaria by Zakaria, Ahmad Zulkhair

    Published 2006
    “…Instead of developing the integration module, this project also run an analysis on the effect of VoIP based on UDP protocol and also proposed an algorithm to search an online NBPL’s Skype user.…”
    Get full text
    Get full text
    Student Project
  5. 5

    A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus by Megat Yunus, Puteri Nor Ashikin

    Published 2023
    “…This thesis presents a new algorithm for output prediction and online monitoring in a Grid-Connected Photovoltaic (GCPV) system based on an artificial neural network. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Skype multimedia application traffic analysis on home Unifi network / Siti Fatimah Ramle by Ramle, Siti Fatimah

    Published 2017
    “…This study is significant in developing a dynamic committed access rate algorithms line which would benefits the broadband network users.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Video traffic analysis on Unifi broadband network / Laina Sofia Mahamad by Mahamad, Laina Sofia

    Published 2017
    “…Thirdly, to identify best traffic model based on fitted model in developing network traffic bandwidth control algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Recommendations Related To Wheeze Sound Data Acquisition by Sundaraj, Kenneth, Nabi, Fizza Ghulam, Lam, Chee Kiang, Palaniappan, Rajkumar, Hussain, Jawad

    Published 2018
    “…In the field of computerized respiratory sounds,a reliable data set with a sufficient number of subjects is required for the development of wheeze detection algorithm or for further analysis.Validated and accurate data is a critical issue in the field of research.In this study,the protocol related to wheeze sound data acquisition is discussed.Previously,most articles focused on wheeze detection or its parametric analysis,but no consideration was given to data acquisition.Second major purpose of this study is to exhibit particulars of our dataset which was attained for future analysis.We compile a database with a sufficient and reliable number of cases with all essential details,in contrast to commercially available wheeze sound data used for research,freely available online data on websites and data used to train medical students for auscultation.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Multi-dimensional networking and distributed computing services by Pathan, Al-Sakib Khan

    Published 2012
    “…The multi-dimensional research issues include wireless and mobility problems, routing protocols and algorithms, resource and service location protocols, performance evaluations of networking systems, ubiquitous systems, context aware ubiquitous environment, mechanisms to improve throughput over wireless links, network management and network security, and other related areas. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic by Mohammed, Athraa Jasim

    Published 2012
    “…The rapid development of Internet increases the writers of blog sites. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Thus, the users are able to make a phone call, send messages using variety of application such as Whatsapp and Line, send email, serving websites, accessing maps and handling some daily tasks via online using online banking, online shopping and online meetings via video conferences. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of open platform controller for step-NC compliant CNC system by Chi Adam, Mohd Khairil Anbia

    Published 2020
    “…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis