Search Results - (( based classification scheduling algorithm ) OR ( java based encryption algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  4. 4

    Fuzzy C-Mean And Genetic Algorithms Based Scheduling For Independent Jobs In Computational Grid by Lorpunmanee, Siriluck, Md Sap, Mohd Noor, Abdullah, Abdul Hanan

    Published 2006
    “…Our model presents the method of the jobs classifications based mainly on Fuzzy C-Mean algorithm and mapping the jobs to the appropriate resources based mainly on Genetic algorithm. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Additionally, the traffic are relying on the markers and scheduling algorithms to the service classes at the routers. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A survey : particle swarm optimization-based algorithms for grid computing scheduling systems. by Ambursa, Faruku Umar, Latip, Rohaya

    Published 2013
    “…This study surveys PSObased scheduling algorithms for Grid systems and presents a classification for the various approaches adopted. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9

    Overview of metaheuristic: classification of population and trajectory by Zainul Rashid, Zarina

    Published 2010
    “…The algorithm techniques can be characterized based on the criteria of the operation of the search process. …”
    Get full text
    Get full text
    Monograph
  10. 10

    File integrity monitor scheduling based on file security level classification by Abdullah, Zul Hilmi, Udzir, Nur Izura, Mahmod, Ramlan, Samsudin, Khairulmizam

    Published 2011
    “…Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean by Lorpunmanee, Siriluck, Abdullah, Abdul Razak

    Published 2007
    “…This paper presents the need for such a prediction and optimization engine that discusses the approach for history-based prediction and optimization. Simulation runs demonstrate that our algorithm leads to better results than the traditional algorithms for scheduling policies used in Grid environment.…”
    Get full text
    Article
  12. 12
  13. 13

    Text classification using Naive Bayes: An experiment to conference paper by Sainin, Mohd Shamrie

    Published 2005
    “…This process is time consuming and may classify papers into unrelated themes.Based on this situation, an automated text document classification can replace the manual classification; hence reduce the decision time.In this paper, the similar algorithm that was applied in the previous experiment for the forum messages classification will be discussed according to the experiment for conference paper classification.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    A review of controllers and optimizations based scheduling operation for battery energy storage system towards decarbonization in microgrid: Challenges and future directions by Hossain Lipu, M.S., Ansari, S., Miah, M.S., Hasan, K., Meraj, S.T., Faisal, M., Jamal, T., Ali, S.H.M., Hussain, A., Muttaqi, K.M., Hannan, M.A.

    Published 2022
    “…Several approaches have been employed to improve the performance of microgrids; however, the review studies on controllers and optimizations based scheduling operations in microgrid have not been explored yet. …”
    Get full text
    Get full text
    Article
  20. 20

    A review of controllers and optimizations based scheduling operation for battery energy storage system towards decarbonization in microgrid: Challenges and future directions by Hossain Lipu, M.S., Ansari, S., Miah, M.S., Hasan, K., Meraj, S.T., Faisal, M., Jamal, T., Ali, S.H.M., Hussain, A., Muttaqi, K.M., Hannan, M.A.

    Published 2022
    “…Several approaches have been employed to improve the performance of microgrids; however, the review studies on controllers and optimizations based scheduling operations in microgrid have not been explored yet. …”
    Get full text
    Get full text
    Article