Search Results - (( data communications function algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…In a conclusion, SEM prototype and adaptive communication data transfer algorithm with a combination of the three communication will be another method to solve a single communication problem of SM and suitable in residential location that offered the proposed communication infrastructure.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Comparison analysis of stream cipher algorithms for digital communication by Mat Sidek, Abd. Rahim, Sha'ameri, Ahmad Zuri

    Published 2007
    “…The stream cipher algorithms evaluated are based on the linear feedback shift register (LFSR) with nonlinear combining function. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems by Subramaniam, Jeevan Rao

    Published 2006
    “…The adaptive algorithms are evaluated as a function of the number of iterations it takes to converge and its transmission performance are compared. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Embedded Ethernet System For Real-Time Communication by Thiagarajan, Durgesh

    Published 2018
    “…Real-time communication (RTC) indicates the transmission of data or message between two medium that occur with minimum delay or latency. …”
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13

    Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed by Mohamed, Kamsiah

    Published 2022
    “…In the symmetric key, a block cipher is an important primitive to provide confidentiality for data transmitted in insecure communication environments. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase by Alaidaros, Hashem Mohammed, A. Rasid, Mohd Fadlee, Othman, Mohamed, Raja Abdullah, Raja Syamsul Azmir

    Published 2007
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Design optimization for mass sizing of LEO communication satellites / Luqman Fathurrohim...[et al.] by Fathurrohim,, Luqman, Ridanto, Eko Poetro, Fariz, Ahmad

    Published 2018
    “…The optimization starts with defining an objective function, which is the total mass of satellites, as a function of their orbit altitude, antenna transmit diameter, and nominal data rates. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Effective downlink resource management for wimax networks by Shareef, Zayd Ashraf Najeeb

    Published 2018
    “…Therefore, EDRM maximised the data transfer rate and reached effective transmission and utilisation in all the developed functions. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…Besides, the algorithm enables an accurate prediction to the center of data eye with an even number of oversampling clock to data rate ratio. …”
    Get full text
    Get full text
    Conference or Workshop Item