Search Results - (( developing world connection algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Thesis
  3. 3

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Elastic-TCP: flexible congestion control algorithm to adapt for high-BDP networks by Alrshah, Mohamed Alhadi Mahmoud, Al-Moqri, Mohamed A., Othman, Mohamed

    Published 2019
    “…In the last decade, the demand for Internet applications has been increased, which increases the number of data centers across the world. These data centers are usually connected to each other using long-distance and high-speed networks. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Forecasting of photovoltaic output using hybrid particle swarm optimization-artificial neural network model / Muhamad Faizol Adli Abdullah by Abdullah, Muhamad Faizol Adli

    Published 2010
    “…Backpropagation (BP) algorithm is widely used to solve many real world problems by using the concept of Multilayer Perception (MLP). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Functional Connectivity Assessment on Aging Brain using Functional Near Infrared Spectroscopy (fNIRS) by Chan, Yee Ling

    Published 2017
    “…They performed three categories of semantic verbal fluency test while neuronal activity in prefrontal cortex (PFC) measured using fNIRS. A new software algorithm has been developed to derive functional connectivity parameters. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Heart-design nexus: the emotion algorithm by Mohd Lokman, Anitawati

    Published 2025
    “…How might these approaches help create a world that is not just functionally efficient but emotionally enriching? …”
    Get full text
    Get full text
    Book
  9. 9

    Automating commercial video game development using computational intelligence by Tse, Guan Tan, Teo, Jason Tze Wi, Patricia Anthony

    Published 2011
    “…Pac-man. The resulting algorithm is referred to as an Evolution Strategies Neural Network or ESNet. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Impact of multiplay transmission in mobile WIMAX using overlay scanning: article / Akmarya Syukhairilnisah Mohd Akhir by Mohd Akhir, Akmarya Syukhairilnisah

    Published 2014
    “…In hard handover has a short time break known as handover interruption decrease the QoS due to connection between MS and serving BS closed and ranging hand initiation to establish new connection. …”
    Get full text
    Get full text
    Article
  11. 11

    Incorporating stemming algorithm in the Malay information retrieval that employs Thesaurus aproach / Mohd Rosmadi Mokhtar by Mokhtar, Mohd Rosmadi

    Published 2001
    “…A wide range of text-based information therefore can be searched and retrieved from online connection anywhere in the world. This type of popularity is due to advancement in technology that is rapidly growing from day to day. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Automatic Mind Maps Generation for The Holy Quran by Khedher, Akram M.Z.M., Issa, Hamed, Wasiq, Shafiullah

    Published 2022
    “…The majority of the Holy Quran learners suffer from lack of quality in memorization understanding and connecting its topics. Therefore, the aim of this paper is to develop an algorithm that automatically generate the topics ‎based on the mind map of a set of verses in the Holy Quran. …”
    Get full text
    Get full text
    Article
  14. 14

    Conclusion by Alginahi, Yasser M., Kabir, M. Nomani

    Published 2019
    “…The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. The first six chapters of the book provide the fundamental details of the authentication technologies.The objective of Chapters 7 to 11 is to develop fast and secure algorithms for resource-constrained IoT and cloud computing, while the aim of Chapter 12 is to protect the data by laws and policies. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  15. 15

    Impact of multiplay transmission in mobile WIMAX using overlay scanning / Akmarya Syukhairilnisah Mohd Akhir by Mohd Akhir, Akmarya Syukhairilnisah

    Published 2014
    “…All simulations are run using MATLAB software to develop a new Overlay Scanning Mechanism(OSMA) algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction by Alkawsi G., Al-amri R., Baashar Y., Ghorashi S., Alabdulkreem E., Kiong Tiong S.

    Published 2024
    “…Lately, a fully online buffer-based clustering algorithm for handling evolving data streams (BOCEDS) was developed. …”
    Article
  19. 19

    Cyber vulnerabilities in smart grid and safety measures for energy meters in advanced metering system and smart meter communications by Ayob A., Salim Reza S.M., Hussain A., Saad M.H.M., Amin N.

    Published 2023
    “…Besides, to ensure security of the network communication, a solution has been proposed using Elliptic Curve Cryptography (ECC) in combination with Salsa20 stream cipher algorithm. Comprehensive mathematical simulations have been conducted for both methodologies to examine their effectiveness in the real world, and to analyze whether they are efficient in terms of time and processing power. …”
    Article
  20. 20

    Detection and Recognition of Broken Character in Car Plate Image by Abd Halim, Suhaila, Zulkifli, Mohd Syazreen

    Published 2020
    “…Therefore, this study is concerned to develop a tool with recognition algorithm that able to detect the broken character on car plate by using Template Matching. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item