Search Results - (( developing world connection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- connection algorithm »
- implication based »
- developing world »
- java implication »
-
1
-
2
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
3
New approach of cryptography algorithm for e- mail applications
Published 2005“…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Conference or Workshop Item -
4
Elastic-TCP: flexible congestion control algorithm to adapt for high-BDP networks
Published 2019“…In the last decade, the demand for Internet applications has been increased, which increases the number of data centers across the world. These data centers are usually connected to each other using long-distance and high-speed networks. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Forecasting of photovoltaic output using hybrid particle swarm optimization-artificial neural network model / Muhamad Faizol Adli Abdullah
Published 2010“…Backpropagation (BP) algorithm is widely used to solve many real world problems by using the concept of Multilayer Perception (MLP). …”
Get full text
Get full text
Thesis -
7
Functional Connectivity Assessment on Aging Brain using Functional Near Infrared Spectroscopy (fNIRS)
Published 2017“…They performed three categories of semantic verbal fluency test while neuronal activity in prefrontal cortex (PFC) measured using fNIRS. A new software algorithm has been developed to derive functional connectivity parameters. …”
Get full text
Get full text
Final Year Project -
8
Heart-design nexus: the emotion algorithm
Published 2025“…How might these approaches help create a world that is not just functionally efficient but emotionally enriching? …”
Get full text
Get full text
Book -
9
Automating commercial video game development using computational intelligence
Published 2011“…Pac-man. The resulting algorithm is referred to as an Evolution Strategies Neural Network or ESNet. …”
Get full text
Get full text
Get full text
Article -
10
Impact of multiplay transmission in mobile WIMAX using overlay scanning: article / Akmarya Syukhairilnisah Mohd Akhir
Published 2014“…In hard handover has a short time break known as handover interruption decrease the QoS due to connection between MS and serving BS closed and ranging hand initiation to establish new connection. …”
Get full text
Get full text
Article -
11
Incorporating stemming algorithm in the Malay information retrieval that employs Thesaurus aproach / Mohd Rosmadi Mokhtar
Published 2001“…A wide range of text-based information therefore can be searched and retrieved from online connection anywhere in the world. This type of popularity is due to advancement in technology that is rapidly growing from day to day. …”
Get full text
Get full text
Thesis -
12
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
13
Automatic Mind Maps Generation for The Holy Quran
Published 2022“…The majority of the Holy Quran learners suffer from lack of quality in memorization understanding and connecting its topics. Therefore, the aim of this paper is to develop an algorithm that automatically generate the topics based on the mind map of a set of verses in the Holy Quran. …”
Get full text
Get full text
Article -
14
Conclusion
Published 2019“…The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. The first six chapters of the book provide the fundamental details of the authentication technologies.The objective of Chapters 7 to 11 is to develop fast and secure algorithms for resource-constrained IoT and cloud computing, while the aim of Chapter 12 is to protect the data by laws and policies. …”
Get full text
Get full text
Get full text
Book Chapter -
15
Impact of multiplay transmission in mobile WIMAX using overlay scanning / Akmarya Syukhairilnisah Mohd Akhir
Published 2014“…All simulations are run using MATLAB software to develop a new Overlay Scanning Mechanism(OSMA) algorithm. …”
Get full text
Get full text
Thesis -
16
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Intrusion detection on the in-vehicle network using machine learning
Published 2021Get full text
Get full text
Get full text
Proceeding Paper -
18
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…Lately, a fully online buffer-based clustering algorithm for handling evolving data streams (BOCEDS) was developed. …”
Article -
19
Cyber vulnerabilities in smart grid and safety measures for energy meters in advanced metering system and smart meter communications
Published 2023“…Besides, to ensure security of the network communication, a solution has been proposed using Elliptic Curve Cryptography (ECC) in combination with Salsa20 stream cipher algorithm. Comprehensive mathematical simulations have been conducted for both methodologies to examine their effectiveness in the real world, and to analyze whether they are efficient in terms of time and processing power. …”
Article -
20
Detection and Recognition of Broken Character in Car Plate Image
Published 2020“…Therefore, this study is concerned to develop a tool with recognition algorithm that able to detect the broken character on car plate by using Template Matching. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
