Search Results - (( java application using algorithm ) OR ( source detection packet algorithm ))

Refine Results
  1. 1

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Moreover, by checking acknowledge (ACK) packet by source node and confirm whether it belongs to the 1-hop neighbor or 2-hop neighbor, it is able to detect the wormhole in early stage. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Anomaly behavior detection using flexible packet filtering and support vector machine algorithms by Abdul Wahid, Mohammed N.

    Published 2016
    “…FPF of SVM have merged the analyzed results of flexible packet filtering with support vector machine algorithm to get better classification of the captured network traffics and to detect anomalies. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Void avoidance opportunistic routing density rank based for underwater sensor networks by Ismail, Nasarudin

    Published 2021
    “…In UWSNs, the energy consumption used is 125 times more during the forwarding of the packet data from source to destination as compare to during receiving data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks by Alahdal, Tariq A. A.

    Published 2008
    “…To carry out this task, several reliable multicast protocols have been proposed to reduce the number of feedback packets from the receiver nodes. This is achieved by placing the responsibility to detect packet loss and initiating loss recovery timer on the receiver nodes which is complemented by feedback suppression. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack by Izaddoost, Alireza

    Published 2008
    “…Traceback models try to locate source of attack regardless of whether the source address field in each packet contains false information or not. …”
    Get full text
    Get full text
    Thesis
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9
  10. 10

    BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS by Yasir Abdelgadir , Mohamed, Azween, Abdullah

    Published 2010
    “…Packets are more prone to different vulnerabilities while routed from a source to a destination passing through untrustworthy intermediate nodes. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Biologically Inspired Network on Chip Fault Tolerant Algorithm Using Time Division Multiplexing by Sethi, Muhammad Athar Javed, Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…The technique is fault tolerant as it detects and bypass the faulty interconnects. With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Biologically inspired network on chip fault tolerant algorithm using time division multiplexing by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…The technique is fault tolerant as it detects and bypass the faulty interconnects. With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
    Get full text
    Get full text
    Article
  18. 18

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19
  20. 20

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The method used to develop this project is Rapid Application Development (RAD). …”
    Get full text
    Get full text
    Final Year Project