Search Results - (( using linear protocol algorithm ) OR ( java application means algorithm ))

Refine Results
  1. 1

    On the security of digital signature protocol based on iterated function systems. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2011
    “…A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Embedded Ethernet System For Real-Time Communication by Thiagarajan, Durgesh

    Published 2018
    “…The Ethernet network model is used to analyze the performance of the backoff algorithm in a different number of nodes. …”
    Get full text
    Get full text
    Monograph
  3. 3

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The K-means algorithm has been around for over a century. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    A new particle swarm optimization for wireless mesh routing protocol by Abd. Rahman, Tharek

    Published 2008
    “…For PSO, we propose a new method of sigmoid increasing inertia weight to improve the speed of convergence and maximum optimum solution in the multidimensional space. Four standard non-linear benchmark functions are used to confirm its validity using MATLAB. …”
    Get full text
    Monograph
  5. 5
  6. 6

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
    Get full text
    Get full text
    Journal
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…The use of non-linear S-Box is essential in preventing linear approximations that could lead to successful attacks, such as differential cryptanalysis. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Network performance optimisation using odd and even dual interleaving routing algorithm for oil and gas pipeline networke by Subramaniam, Siva Kumar, Ikhwan Lee, Mohamad Yusry Lee, Azman, Amierul Syazrul Azril, Feroz, Farah Shahnaz, Rajkumar, Sujatha

    Published 2022
    “…To fit the requirement, the sensor nodes have to be arranged in a linear formation. Performance evaluation has been carried out using reactive (AODV) and proactive (DSDV) routing protocols during the initial phases of the research. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Routing protocols performance on 6LoWPAN IoT networks by Abdul Razak, Siti Fatimah, Pei, Siang Chia, Kamis, Noor Hisham, Yogarayan, Sumendra, S. M. M Yassin, S. M. Warusia Mohamed, Abdollah, Mohd Faizal

    Published 2025
    “…This result is valuable to further implement these protocols in the testbed as well as provide an idea of the algorithmic enhancements.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Key exchange for new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2013
    “…Basically the protocol uses the second order linear recurrence relation and the multiplicative group of integers modulo p. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Intrusion detection on the in-vehicle network using machine learning by Sharmin, Shaila, Mansor, Hafizah

    Published 2021
    “…This paper presents an intrusion detection method based on the Isolation Forest (iForest) algorithm that detects message insertion attacks using message timing information. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper