Search Results - (( problem during protocol algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4
  5. 5

    Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management by Vivaldi, Indra, Habaebi, Mohamed Hadi, Mohd Ali, Borhanuddin, V., Prakash

    Published 2003
    “…This algorithm will enable the mobile node to receive packet faster than HMIPv6 protocol during handover, seamlessly and transparently. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Void avoidance opportunistic routing density rank based for underwater sensor networks by Ismail, Nasarudin

    Published 2021
    “…Firstly, the higher traffic load for selection next forwarding nodes in the problematic progression area problem was addressed by using the Opportunistic Routing Density Based (ORDB) algorithm to minimize the traffic load by introducing a beaconless routing to update the neighbor node information protocol. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design. by Khatun, Sabira

    Published 2006
    “…This invention solves the problem of long delay and packet loss incurred during handover through enhancement of handover management in Mobile IPv6. …”
    Get full text
    Patent
  9. 9

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…After embedding the presented solution, a new protocol is created and applied. Thus, the new protocol is available to the communicating packets across all computer networks. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Lightweight and Efficient Dynamic Cluster Head Election Routing Protocol for Wireless Sensor Networks by Yagoub, Mudathir F. S., Khalifa, Othman Omran, Abdelmaboud, Abdelzahir, Korotaev, Valery, Kozlov, Sergei A., Rodrigues, Joel J. P. C.

    Published 2021
    “…Additionally, the proposed protocol is distinguished by deleting dead nodes from the network topology list during the re-clustering process to address the black holes and routing delay problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks by Qadawi, Zahraa D.A.

    Published 2013
    “…Therefore, this thesis examines two main drawbacks of CSMA-CA algorithm; the first problem is that during CSMACA mechanism, a node tends to delay for a very limited number of backoff exponent (BE). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions by Abbas O.K., Abdullah F., Radzi N.A.M., Salman A.D., Abdulkadir S.J.

    Published 2025
    “…Many clustered routing algorithms have been developed to address various issues like energy efficiency, network lifetime, and hotspot problems. …”
    Article
  14. 14

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    Article
  17. 17

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis