Search Results - (( using mac proposed algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase by Alaidaros, Hashem Mohammed, A. Rasid, Mohd Fadlee, Othman, Mohamed, Raja Abdullah, Raja Syamsul Azmir

    Published 2007
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Improving security performance with parallel crypto operations in SSL bulk data transfer by Alaidaros, Hashem Mohammed, Othman, Mohamed, A. Rasid, Mohd Fadlee

    Published 2009
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    An efficient backoff algorithm for IEEE 802.15.4 wireless sensor networks by Dahham, Zahraa, Sali, Aduwati, Mohd Ali, Borhanuddin

    Published 2014
    “…In this paper, we propose an efficient backoff algorithm, called EBA-15.4MAC that enhances the performance of slotted CSMA/CA algorithm. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman by Osman, Noor Diyana

    Published 2014
    “…The last part is the development of a metal artifact correction (MAC) algorithm and evaluation of the proposed algorithm in artifacts reduction in CT images. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks by Qadawi, Zahraa D.A.

    Published 2013
    “…Secondly, to increase the efficiency of EBA-15.4MAC algorithm, we propose a new scheme to resolve the problem of access collision arising from the small number of backoff exponent used by CSMA-CA. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An Energy Efficient Mac Layer Design for Wireless Sensor Network by Ghazvini, Mohammad Hossein Fotouhi

    Published 2008
    “…The proposed MAC protocol has improved the energy consumption around 60% as compared to ABE-MAC. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A novel algorithm to prevent man in the middle attack in LAN environment by Ahmed , Mohiuddin, Hazza, Muataz

    Published 2010
    “…To prevent MITM against HTTPS in LAN environment a novel algorithm (DepMAC-IP) is proposed and discussed in detail. …”
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal by Abubakar Bello , Tambawal

    Published 2020
    “…Sequel to that the Time Division Multiple Access (TDMA) MAC protocol using a cluster-based topology has been proposed by the research community. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A novel spiral backoff mechanism for wireless sensor networks MAC protocol in smart grid system by Ahmed, Musse Mohamud, Bari, S.M. Sadakatul

    Published 2015
    “…Simulation results show that proposed spiral backoff algorithm reduces the end-to-end delay and increases packet delivery ratio (PDR) for the smart grid wireless sensor networks.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17

    Adaptive Medium Access Control (ADT-MAC) Protocol for Dynamic Medical Traffic with Quality of Service (QoS) provisioning in Wireless Body Area Network (WBAN) by Wan Hassan, Wan Haszerila

    Published 2025
    “…The proposed ADT-MAC protocol is simulated using Castalia in OMNeT++ to evaluate its performance against state-of-the-art MAC protocols. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E by Oad, Aneel

    Published 2013
    “…The acquired results have proven that the proposed algorithms have successfully enhanced the legacy hybrid and the deadline based algorithm.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network by Jahan, Mohammad Saukat

    Published 2015
    “…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. Results indicate that the energy consumption is decreased to 25% in a moderately loaded (1pkt/sec) network to a heavily loaded (10pkt/sec) network over the standard of IEEE 802.15.4, EBA-15.4MAC, G-MAC, LEACH and ADAPT protocol. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Efficient back-off mechanism for IEEE802.15.4 wireless sensor networks by Dahham, Zahraa, Sali, Aduwati, Mohd. Ali, Borhanuddin

    Published 2015
    “…In this book, we propose an efficient backoff algorithm, called EBA-15.4MAC that enhances the performance of slotted CSMA/CA algorithm. …”
    Get full text
    Get full text
    Book