Search Results - (( development projects protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- development projects »
- protocol algorithm »
- implication based »
- java implication »
-
1
-
2
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017Get full text
Get full text
Monograph -
3
Implementation of Station-To-Station (STS) protocol using Elliptic Curve Digital Signature Al Algorithm / Muhammad Faris Fakhri Rozi, Alya Syuhada Ismail and Emylia Suhaimi
Published 2018“…This project was developed into a Graphical User Interface (GUI) using MAPLE software to show how the system works. …”
Get full text
Get full text
Student Project -
4
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
5
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
6
SNR Based DSDV Routing Protocol for MANET
Published 2012“…In this project the Signal-to-Noise (SNR) based routing protocol has been adapted into the standard Destination Sequenced Distance Vector (DSDV) routing algorithm by developing an algorithm to calculate the cumulative average SNR from source to destination and apply the algorithm in the DSDV routing protocol. …”
Get full text
Get full text
Get full text
Thesis -
7
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
8
Software Development For Conversion Of Ip To Wireless Atm (Watm)
Published 2002“…In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. …”
Get full text
Get full text
Thesis -
9
Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network
Published 2003“…The algorithm was developed in Visual Basic 6.0v programming language. …”
Get full text
Get full text
Thesis -
10
-
11
Network tool for preventing DDOS attacks on cloud computing
Published 2015Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
Smart and energy aware routing for the internet of mobile things
Published 2021“…In this project, we aim to design and develop a new routing algorithm entitled “SEA routing protocol” that is believed to resolve the problems mentioned which will lead to high energy consumption in IoMT devices. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Research in secure data transfer on network layer has been discussed in detail on the importance to have secure Internet protocol in E-Commerce environment. This particular research successfully produced a protocol to suit AES encryption algorithm in Internet Protocol Security (IPSec).…”
Get full text
Get full text
Monograph -
14
-
15
TELE-OPERATED ROBOT USING VC PROGRAMMING PROTOCOL
Published 2007Get full text
Get full text
Final Year Project -
16
The integration of Voip and e-Learning system in a collaborative learning environment / Ahmad Zulkhair Zakaria
Published 2006“…Through the new assigned module, NBPL’s users can view all the online NBPL’s Skype user and also can click at the username to contact the user via VoIP call managed by the Skype application. Instead of developing the integration module, this project also run an analysis on the effect of VoIP based on UDP protocol and also proposed an algorithm to search an online NBPL’s Skype user.…”
Get full text
Get full text
Student Project -
17
Stability improved of improved low energy adaptive clustering hierarchy routing protocol for wireless sensor network
Published 2017“…Hence, it is motivated us to enhance Improved LEACH algorithm to provide higher stability. In this project, a protocol named Stable Improved LEACH is designed to overcome the shortcomings of Improved LEACH. …”
Get full text
Get full text
Get full text
Thesis -
18
Strategies for effective value management practice in construction industry
Published 2017“…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Development of wireless data acquisiton system using LoRa technology for construction of PID control system
Published 2025text::Thesis -
20
Stability improvement low energy adaptive clustering hierarchy routing (sileach) protocol for wireless sensor network
Published 2017“…Hence, it is motivated us to enhance Improved LEACH algorithm to provide higher stability. In this project, a protocol named Stable Improved LEACH is designed to overcome the shortcomings of Improved LEACH. …”
Get full text
Get full text
Get full text
Thesis
