Search Results - (( developing public protocol algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- protocol algorithm »
- java implication »
- implication tree »
- tree algorithm »
-
1
-
2
-
3
GPS-less Localization Protocol for Underwater Acoustic Networks
Published 2008Get full text
Get full text
Get full text
Article -
4
A protocol for developing a classification system of mosquitoes using transfer learning
Published 2022“…Transfer learning is a type of machine learning that is viable and durable in image classification with limited training images. This protocol aims to develop step-by-step procedure in developing a classification system with transfer learning algorithm for mosquito, we demonstrate the protocol to classify two species of Aedes mosquito - Aedes aegypti L. and Aedes albopitus L, but user can adopt the protocol for higher number of species classification. …”
Get full text
Get full text
Get full text
Article -
5
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
6
Implementation of the Merkle-Hellman knapsack cryptosystem into station-to-station protocol / Nurzhulaika Yahya, Noor Izzah Agil and Nur ‘Afini Nordin
Published 2023“…Then, to implement Merkle-Hellman digital signature into Station-To-Station Protocol. Next, to develop maple for interface the proposed method. …”
Get full text
Get full text
Student Project -
7
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…This paper provides the scholarly community with an approach to boosting service availability in web servers under slow Hypertext Transfer Protocol (HTTP) DDoS attacks through attack detection using Genetic Algorithm and Support Vector Machine which facilitates attack mitigation in a Software-Defined Networking (SDN) environment simulated in GNS3. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Efficiency analysis for public key systems based on fractal functions.
Published 2011“…By exchanging the generated public keys using one of the well known key exchange protocols, both parties can calculate a unique shared key. …”
Get full text
Get full text
Get full text
Article -
9
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
-
12
-
13
-
14
Fully automated segmentation of the left ventricle in cine cardiac magnetic resonance imaging / Tan Li Kuo
Published 2018“…In conclusion, two algorithms were developed and tested leading to fully automatic segmentation of LV in cardiac cine MRI. …”
Get full text
Get full text
Get full text
Thesis -
15
Discrete simulation framework for wireless cellular networks.
Published 2008Get full text
Get full text
Article -
16
-
17
Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan
Published 2022“…The algorithm can be developed by using MAPLE software to generate points and calculate the procedure more easily. …”
Get full text
Get full text
Student Project -
18
-
19
-
20
Dual authentication for bluetooth connection
Published 2014“…Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Article
