Search Results - (( process sharing protocol algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata by Mohamad Hata, Mohsen

    Published 2019
    “…The protocol defines the procedures which engage two layers of deniability techniques; namely Secret Sharing and Valid Fake Messages. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…It also showed that DES algorithm produced the best time success along with WEP encryption protocol. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Reduced latency in restricted flooding routing protocol for mobile ad hoc network. by A. Latif, Liza, Ali, A., Fisal, Norsheila

    Published 2007
    “…With location information of the destination node, the source node and also of the current node, RREQ will be more directed towards destination since nodes that are within the directed region will participate in the routing process. This paper presents Quadrant-based directional routing protocol (Q-DIR) algorithm that restrict the broadcast region to a quadrant where the destination node and source node are located. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  10. 10
  11. 11

    Implementation of Schnorr Digital Signature into Station-to-Station Protocol / Nurul Mahira Budin, Nor Hafikah Othman and Nur Izzatie Farhana Ahmad Fauzan by Budin, Nurul Mahira, Othman, Nor Hafikah, Ahmad Fauzan, Nur Izzatie Farhana

    Published 2018
    “…Thus, we implement Schnorr Digital Signature into STS protocol to use Schnorr elements in completing the key exchange process. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Blockchain based security framework for device authentication and data communication in decentralized IoT network by Alahmed, Mahmoud Tayseer

    Published 2023
    “…The proposed authentication protocol has reduced the time required for authentication by 12.5% compared to similar blockchain based authentication protocols. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol by Pirborj, Nesae Mouzehkesh

    Published 2009
    “…A Medium Access Control (MAC) protocol is responsible to sufficiently provide access to a shared medium. …”
    Get full text
    Get full text
    Thesis
  14. 14

    MAC Protocol for Opportunistic Spectrum Access in Cognitive Radio System by Armi, Nasrullah, M Saad, M Naufal, Yusoff, Mohd Zuki, Arshad, Muhammad

    Published 2011
    “…In this paper, we study MAC protocol design for OSA in Cognitive Radio (CR) ad hoc network under Partially Observable Markov Decision Process (POMDP) algorithm that maximizes achievable throughput for SUs with sufficient protection to PUs. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs by Khalid, Haqi, Hashim, Shaiful Jahari, Hashim, Fazirulhisyam, Syed Ahamed, Sharifah Mumtazah, Chaudhary, Muhammad Akmal, Altarturi, Hamza H. M., Saadoon, Muntadher

    Published 2023
    “…Therefore, the number of handovers may increase, and the process of sharing authentication keys between drones to new drones may be vulnerable to eavesdropping due to the wireless connectivity. …”
    Get full text
    Get full text
    Article
  16. 16

    Key exchange for new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2013
    “…Key exchange or key establishment is any process in cryptography by which users are able to share or exchange a secret key. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Relay suitability based routing protocol for video streaming in vehicular ad-hoc network by Omar Abdulmaged, Hammood

    Published 2022
    “…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model by Jasim, Ahmed Abdulhadi, Idris, Mohd Yamani Idna, Azzuhri, Saaidal Razalli, Issa, Noor Riyadh, Noor, Noorzaily Mohamed, Kakarla, Jagadeesh, Amiri, Iraj Sadegh

    Published 2019
    “…This newly developed protocol is named Secure and Energy-Efficient Data Aggregation (SEEDA), which is the extension of SDAACA protocol. …”
    Get full text
    Get full text
    Article
  20. 20