Search Results - (( developing security max algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Face anti-spoofing using Convolutional Neural Networks / Siti Nurul Izzah Bahrain by Bahrain, Siti Nurul Izzah

    Published 2024
    “…In this project, the Convolutional Neural Network (CNN) algorithm was implemented using TensorFlow in Python to detect fake face images. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Braille display systems for blind people with haptic belt by Kamarudin, Muhammad Nizam, Hairi, Mohd Hendra, Aboali, Maged Yahya Ali Hussein, Mohd Shah, Hairol Nizam, Mohd Aras, Mohd Shahrieel, Md. Rozali, Sahazati

    Published 2021
    “…Thus, the project in this manuscript portrays the development of a new design by using Micro servomotors and embedded soft-computing algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5