Search Results - (( development information protocol algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- development information »
- information protocol »
- application testing »
- protocol algorithm »
- testing algorithm »
- java application »
-
1
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
Article -
4
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
5
Agro-ento bioinformation: towards the edge of reality
Published 2002“…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
Get full text
Get full text
Inaugural Lecture -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks
Published 2016“…However, this mechanism is vulnerable to attacks by malicious black hole nodes. The mechanism is developed to find the shortest secure path and to reduce overhead using the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…In this thesis an enhanced neighbor protocol (ENP) has been developed to collect and maintain 2-hop neighbor information at each node. …”
Get full text
Get full text
Get full text
Thesis -
10
Performance Evaluation for Network Set up and Nodes Discovery Protocol in Underwater Grid Topology Networks
Published 2010“…One of the major challenges in the UANs area of research is the development of a networking protocol that can cope with the adverse underwater environment. …”
Get full text
Get full text
Get full text
Article -
11
Performance enhancement of AIMD algorithm for congestion avoidance and control
Published 2011“…These protocols have been developed and improved since the advent of the Internet. …”
Get full text
Get full text
Thesis -
12
-
13
A hybrid algorithm for improving the quality of service in MANET
Published 2018Get full text
Get full text
Article -
14
Encryption method for SCADA security enhancement
Published 2014Get full text
Get full text
Get full text
Article -
15
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…The proposed model is developed and simulated on Matlab based on an improved fuzzy vault scheme with a lightweight error correction algorithm to reduce the computational complexity when compared to previous work. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
-
17
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Performance analysis of multipath routing based on source routing
Published 2010Get full text
Working Paper -
19
Position-based multicast routing in mobile ad hoc networks: an analytical study
Published 2012“…This protocol depends on the location information of the multicast members which is obtained using a location service algorithm. …”
Get full text
Get full text
Article -
20
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…This paper provides the scholarly community with an approach to boosting service availability in web servers under slow Hypertext Transfer Protocol (HTTP) DDoS attacks through attack detection using Genetic Algorithm and Support Vector Machine which facilitates attack mitigation in a Software-Defined Networking (SDN) environment simulated in GNS3. …”
Get full text
Get full text
Get full text
Get full text
Article
