Search Results - (( using feature protocol algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks by Jiang, Cailing

    Published 2019
    “…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  4. 4

    Fiber-Wireless testbed using software defined radio for protocol and algorithm testing by Ridwan M.A., Mohamed Radzi N.A., Abdullah F.

    Published 2023
    “…Almost all recently proposed testbed designed for FiWi are using hardware that lacks in programmability feature, making it challenging to implement any protocols and algorithms. …”
    Article
  5. 5

    Network tool for preventing DDOS attacks on cloud computing by Yo, Kee Seng

    Published 2015
    “…Cloud computing services are popular for its ease of use and dynamic scalability with great reliability feature. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  6. 6

    GSAR: Greedy Stand-Alone Position-Based Routing protocol to avoid hole problem occurance in Mobile Ad Hoc Networks by Al-Shugran, Mahmoud Ali

    Published 2014
    “…The Greedy Forwarding Strategy (GFS) has been the most used strategy in position-based routing protocols. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Automated feature extraction on brain MRI images for predicting multiple sclerosis patient disability by M. Muslim, Ali

    Published 2022
    “…Furthermore, they were using manual and semi-automated features extraction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Automated feature extraction for predicting multiple sclerosis patient disability using brain MRI by Muslim, Ali M., Mashohor, Syamsiah, Mahmud, Rozi, Al Gawwam, Gheyath, Hanafi, Marsyita

    Published 2022
    “…This study aims to predict MS patients' disability using fully automated feature extraction, single MRI scan, single MRI protocols and without patient follow-up. …”
    Get full text
    Get full text
    Article
  9. 9

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…The efficiency of EFS features is assessed in two ways: (1) by comparing them to the relevant related work’s features of outliers and flow using four feature importance methods, and (2) by analyzing the classification performance in the scenarios with and without EFS features. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Dynamic object replica placement using underlying routing protocols: ensuring the reliability by Waqas, Ahmad, Majeed, Nahdia, Muhammed Yusof, Zulkefli, Wahees Mahesar, Abdul

    Published 2013
    “…In this paper, it is discussed that reliability can be assured if we use replica placement algorithm along with the EIGRP (Enhanced Interior Gateway Routing Protocol). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12

    Brain Machine Interface Controlled Robot Chair by Hema Chengalvarayan, Radhakrishnamurthy

    Published 2010
    “…The BMI controls the joystick of the robot chair using a shared control algorithm. Real-time experiments are also presented using 10 trained and 5 untrained subjects to validate the applicability of the brain machine interface. …”
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16

    An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network by Ramli, Sofia Najwa

    Published 2016
    “…To enhance the overall performance, this thesis also evaluates the uniqueness and the stability of ECG signal using Independent Component Analysis (ICA) and fast Fourier Transform (FFT) algorithm respectively as the signal is applied as inputs of the proposed ECG-based authentication protocol model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Adaptive reservation TDMA protocol for wireless multimedia traffic by Habaebi, Mohamed Hadi, Mohd Ali, Borhanuddin

    Published 2001
    “…Integration of CBR, voice, VBR, data and control traffic over the wireless ATM channel using the proposed AR-TDMA protocol is considered in the paper. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks by Akanji, Oluwatobi Shadrach, Abisoye, Opeyemi Aderiike, Iliyasu, Mohammed Awwal

    Published 2021
    “…Genetic algorithm was used to select the Netflow features which indicates the presence of an attack and also determine the appropriate regularization parameter, C, and gamma parameter for the Support Vector Machine classifier. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges by Hussein, Nehad Hameed, Koh, Siaw Paw, Yaw, Chong Tak, Tiong, Sieh Kiong, Benedict, F., Yusaf, Talal, K., Kadirgama, Tan, Chung Hong

    Published 2024
    “…Recently, VANET routing protocols have been improved using the multilevel knowledge and an up-to-date global view of traffic conditions offered by SDN technology. …”
    Get full text
    Get full text
    Get full text
    Article