Search Results - (( java application customization algorithm ) OR ( _ internet based algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- internet »
-
1
-
2
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…The research scope is based on collected of internet traffic on IP-based network real live traffic at 16 Mbps speed line. …”
Get full text
Get full text
Thesis -
3
Improving The Algorithm To Detect Internet Worms
Published 2008“…The aim of this project is to improved algorithm to detect internet worm by two sub algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
Real-time Traffic Classification Algorithm Based on Hybrid of Signature Statistical and Port to Identify Internet Applications
Published 2014“…The SSPC algorithm was used to classifying four types of Internet applications in two stages, initially offline and later online. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…The research scope is based on collected of internet traffic on IP-based network real live traffic at 16 Mbps speed line. …”
Get full text
Get full text
Article -
6
Algorithm for the legal regulation of internet financial crime
Published 2024“…Data processing for criminal acts on Internet finance platforms is crucial, with the utilization of random forest algorithms, including Decision tree and Bagging integration algorithms. …”
Get full text
Get full text
Get full text
Article -
7
Zero-degree algorithm for internet GateWay placement in backbone wireless mesh networks
Published 2013“…Different from existing algorithms, this new algorithm incrementally identifies IGWs and prioritively assigns wireless mesh routers (WMRs) based on the computed degree of WMRs to identified IGWs. …”
Get full text
Get full text
Article -
8
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
Get full text
Get full text
Article -
9
Smart and energy aware routing for the internet of mobile things
Published 2021“…This can also be concluded that the SEA routing algorithm is smart and energy aware based on the results obtained.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Makespan algorithms and heuristic for internet-based collaborative manufacturing process using bottleneck approach
Published 2010“…This paper presents makespan algorithms and scheduling heuristic for an Internet-based collaborative design and manufacturing process using bottleneck approach. …”
Get full text
Get full text
Get full text
Article -
11
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
Get full text
Get full text
Thesis -
12
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…The Internet Protocol Security (IPSec) is a standard-based method that being used to protect the information that traverse in the Internet networking without expensive cost or complex modification on Internet application itself. …”
Get full text
Get full text
Conference or Workshop Item -
13
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
16
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. …”
Get full text
Get full text
Get full text
Article -
18
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
Published 2020“…This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper
