Search Results - (( java applications force algorithm ) OR ( using interactive protocol algorithm ))

Refine Results
  1. 1

    Deniable authentication protocol based on factoring and discrete logarithm problems by Nek Abd Rahman, Normahirah, Ismail, Eddie Shahril, Laham, Mohamed Faris

    Published 2022
    “…In terms of communication overhead, the non-interactive protocol is more effective than the interactive protocol. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3
  4. 4

    Quality of service performances of three mobile ad hoc network protocols by Adam, Nabilah

    Published 2009
    “…The thesis proposed to evaluate the Quality of Service (QoS) performances of three types MANET protocols. The protocols included the Dynamic Source Routing (DSR), Ad Hoc On-demand Distance Vector (AODV) and Temporally Ordered Routing Algorithm (TORA) protocol. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  6. 6

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…In particular, important issues such as how smartcard applications can be modeled using UML techniques and how UML can be used to sketch the operations for implementing a secure access using smartcard has been addressed.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Multipath routing protocol based on cross-layer approach for MANET by Allahham, Alaa Azmi, Mohammed, Muamer N., Kadhim, Nassir Sallom

    Published 2017
    “…In an effort to improve the performance of MANETs, there has been increased in protocols that rely on cross-layer interaction between different layers. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A comprehensive analysis of surface electromyography for control of lower limb exoskeleton by Abdelhakim, Deboucha

    Published 2016
    “…The RMSE for both protocols were relatively low varying between 6.88 and 8.31. …”
    Get full text
    Get full text
    Thesis
  10. 10

    IMPROVING QoS OF VoWLAN VIA CROSS-LAYER BASED ADAPTIVE APPROACH by AHMED ALI ALSHAKHSI, SAMEHA

    Published 2013
    “…Voice over Internet Protocol (VoIP) is a technology that allows the transmission of voice packets over Internet Protocol (IP). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Automated bilateral negotiation with incomplete information in the e-marketplace. by Jazayeriy, Hamid

    Published 2011
    “…In addition, the well-known alternating-offers protocol is used to govern the interactions. To generate Pareto-optimal offer with one-side incomplete information, at first,an algorithm is presented to generate multi-issue offers with perfect (complete)information. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Energy efficient cluster head distribution in wireless sensor networks by Siew, Zhan Wei

    Published 2013
    “…PSO is lightweight heuristic optimization algorithm with each CH will move towards the best solutions by individual interaction with one another while learning from their own experience. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Trace analyzer for NS-2 by Salleh A.U., Ishak Z., Din N.Md., Jamaludin M.Z.

    Published 2023
    “…Network simulator 2 (NS-2) is an open source discrete event simulation tool used for simulating Internet protocol (IP) networks. …”
    Conference paper
  16. 16
  17. 17

    Evaluation of Security Metric for Artificial Internet of Things Smart Locking System by Siti Nur Hanani, Mohd Rizal

    Published 2023
    “…This thesis outlines the architectural model of the smart locking system, the design of the face recognition algorithm, and the development of face recognition reader using the Raspberry Pi 3 model B microcontroller. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    A survey of interest flooding attack in named-data networking: Taxonomy, performance and future research challenges by Ren-Ting Lee, Yu-Beng Leau, Yong Jin Park, Mohammed Anbar

    Published 2021
    “…Internet of Things (IoT) allows all entities such as computing devices, machines, objects, people, etc., to interact with each other through their Internet Protocol (IP) addresses without human inter- venti on. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Security framework based multi agent system architecture to facilitate data fetching from cloud data storage by Mohamed, Amir Mohamed Talib

    Published 2012
    “…An approach that superimposes agents to handle security of CSD is designed using the Prometheus Design Tool (PDT). Ontology-driven MAS architecture that helps in providing a unified agent-based interaction system on top of cloud services using Protégé is implemented. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…Today the Internet serves many purposes, from social interaction to information search and conducting business activities to smart connectivity. …”
    Get full text
    Get full text
    Conference or Workshop Item