Search Results - (( developing security cell algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- java implication »
- cell algorithm »
- security cell »
-
1
Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism
Published 2024“…The experiments show that the Cloud IDS model based on Dendritic Cell algorithm able to identify and detect novel threat that targeting Cloud environment.…”
Article -
2
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…Verification algorithm is developed using MATLAB (SIMULINK) function blocks which is capable of authenticating a person's identity by his or her voice pattern. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
-
5
-
6
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
7
Maximum Power Point Tracking (MPPT) of Partially Shaded Photovoltaic Cells: A Technical Review
Published 2013Get full text
Get full text
Book Section -
8
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis -
9
Braille display systems for blind people with haptic belt
Published 2021“…Thus, the project in this manuscript portrays the development of a new design by using Micro servomotors and embedded soft-computing algorithms. …”
Get full text
Get full text
Get full text
Article
