Search Results - (( java segmentation using algorithm ) OR ( using sharing protocol algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata by Mohamad Hata, Mohsen

    Published 2019
    “…Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Implementation of Station-To-Station (STS) protocol using Elliptic Curve Digital Signature Al Algorithm / Muhammad Faris Fakhri Rozi, Alya Syuhada Ismail and Emylia Suhaimi by Rozi, Muhammad Faris Fakhri, Ismail, Alya Syuhada, Suhaimi, Emylia

    Published 2018
    “…Elliptic Curve Digital Signature Algorithms (ECDSA) is implemented in Station-To¬ Station protocol in order to give an improvement in the secret key exchange between two parties. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  6. 6
  7. 7

    QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks by Qureshi, Barkatullah, Othman, Mohamed, K. Subramaniam, Shamala, Abdul Hamid, Nor Asilah Wati

    Published 2011
    “…To overcome these problems Quick Transport Control Protocol (QTCP) algorithm based on optimizations of HS-TCP slow start algorithm and Additive Increase and Multiplicative Decrease (AIMD) algorithm have been proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
    Get full text
    Get full text
    Student Project
  9. 9

    An optimized aggregate marker algorithm for bandwidth fairness improvement in classifying traffic networks by Al-Kharasani, Ameen Mohammed Abdulkarem, Othman, Mohamed, Abdullah, Azizol, Kweh, Yeah Lun

    Published 2016
    “…Extensive simulations were carried out to implement the algorithm using the NS2 simulator and compare the proposed marker algorithm with several other algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Reduced latency in restricted flooding routing protocol for mobile ad hoc network. by A. Latif, Liza, Ali, A., Fisal, Norsheila

    Published 2007
    “…Packet delivery and latency are several performance metrics used to determine the effectiveness of a new routing algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Implementation of Schnorr Digital Signature into Station-to-Station Protocol / Nurul Mahira Budin, Nor Hafikah Othman and Nur Izzatie Farhana Ahmad Fauzan by Budin, Nurul Mahira, Othman, Nor Hafikah, Ahmad Fauzan, Nur Izzatie Farhana

    Published 2018
    “…Thus, we implement Schnorr Digital Signature into STS protocol to use Schnorr elements in completing the key exchange process. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Performance enhancement of AIMD algorithm for congestion avoidance and control by Jasem, Hayder Natiq

    Published 2011
    “…National Chiao Tung University’s network simulation (NCTUns) has been used in this development to compare the new algorithm with the older versions and determine its advantages over the older versions. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…This is achieved by using a new design algorithm by separating marker TCP and UDP protocols and extended the marking probability for injecting more green and yellow traffic into the network. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal by Abubakar Bello , Tambawal

    Published 2020
    “…The proposed EC-TMAC protocol was evaluated through simulation and validated using a statistical analysis tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Embedded Ethernet System For Real-Time Communication by Thiagarajan, Durgesh

    Published 2018
    “…The Ethernet network model is used to analyze the performance of the backoff algorithm in a different number of nodes. …”
    Get full text
    Get full text
    Monograph
  16. 16
  17. 17
  18. 18
  19. 19

    Enhanced Medium Access Control Protocol for Resolving Node Misbehavior in Wireless Networks by Nordin, Noorsalwati

    Published 2007
    “…From the analysis, it was found that when this scheme is employed, the presence of nodes that are over-allocated with resources enables the rest of the nodes to increase their throughput share. The performance analysis of the proposed schemes was conducted with the use of a discrete-event simulator. …”
    Get full text
    Get full text
    Thesis
  20. 20

    MAC Protocol for Opportunistic Spectrum Access in Cognitive Radio System by Armi, Nasrullah, M Saad, M Naufal, Yusoff, Mohd Zuki, Arshad, Muhammad

    Published 2011
    “…Opportunistic Spectrum Access (OSA) brings new research challenges in MAC protocol design. It allows unlicensed users to share licensed spectrum in space and time with no or little interference to Primary Users (PUs). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item