Search Results - (( network implementation information algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implementation information »
- network implementation »
- information algorithm »
- implication based »
- java implication »
-
1
Adaptive routing algorithms and implementation for TESH network
Published 2013Get full text
Get full text
Get full text
Article -
2
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
3
A hybrid algorithm for finding shortest path in network routing.
Published 2009Get full text
Article -
4
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013“…Therefore the Advance Encryption Standard (AES) algorithm is being implemented to secure the evidence captured. …”
Get full text
Get full text
Student Project -
5
SENTIMENT ANALYSIS IN SOCIAL NETWORKS USING NAiVE BAYES ALGORITHM
Published 2011“…This report is concerned with the opinion mining and sentiment analysis in social networks especially Twitter, it aims to give a brief insight into the ongoing research in sentiment analysis algorithms and techniques, and graphical representation of the statistical results by applying the sentiment analysis on social networks. …”
Get full text
Get full text
Final Year Project -
6
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The deployment of network security procedures requires the implementation of Cryptographic algorithms. …”
Get full text
Get full text
Thesis -
7
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…The deployment of network security procedures requires the implementation of cryptographic functions. …”
Get full text
Get full text
Thesis -
8
Performance comparison encryption of IPSEC VPN encryption techniques / Nur Hasyimah Mohd Ridzuan
Published 2015“…This paper presents the implementation of site to site VPN tunneling using a network simulator. …”
Get full text
Get full text
Thesis -
9
-
10
Performance comparison of encryption IPsec VPN encryption techniques / Nur Hasyimah Mohd Ridzuan and Ruhani Ab Rahman
“…This paper presents the implementation of site to site VPN tunneling using a network simulator. …”
Get full text
Get full text
Article -
11
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
12
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014Get full text
Get full text
Article -
13
-
14
-
15
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…RIPEMD-160 is one of the algorithms in hash function that can improve the security in storing information. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
16
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
Get full text
Get full text
Thesis -
17
Fault section detection and location on distribution network using analytical voltage sags database
Published 2006“…Finally, the most probable faulty section is identified using probability approach.This paper presents the implemented algorithms and the test of the algorithms on typical distribution networks. …”
Get full text
Get full text
Conference or Workshop Item -
18
DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS
Published 2014“…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
Get full text
Get full text
Final Year Project -
19
DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS
Published 2014“…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
Get full text
Get full text
Final Year Project -
20
Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation
Published 2019“…Secondly, the information is used to support all vertical handover operations, which includes network discovery, handover decision, and handover implementation. …”
Get full text
Get full text
Thesis
