Search Results - (( developing effective commitment algorithm ) OR ( java implementation mechanism algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  6. 6

    Improving Class Timetabling using Genetic Algorithm by Qutishat, Ahmed Mohammed Ali

    Published 2006
    “…Hence, the major aim of this research is to investigate the internal mechanism of genetic algorithm in solving and improving class timetabling problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Effect of business social responsibility (BSR) on performance of SMEs in Nigeria by Gorondutse, Abdulahi Hassan

    Published 2014
    “…Therefore, significant positive effects of commitment, trust, and perceived ethics suggest that the variables are important in relation to performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Fraud detection in shipping industry based on location using machine learning comparison techniques by Ganesan Subramaniam, Mr.

    Published 2023
    “…Results from this study indicates the usage of k-NN is proven to be most effective algorithm in terms of performance and accuracy required by the shipping industry fraud detection.…”
    text::Thesis
  12. 12

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Examining leadership style and ethical reasoning in Nigeria public sector by Felix, Chikelu Okey

    Published 2016
    “…Findings also showed that the relationship between transformational leadership and post conventional cognitive moral development was found to be significantly moderated by religiosity commitment and vertical individualism and collectivism. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Solving Unit Commitment Problem Using Multi-agent Evolutionary Programming Incorporating Priority List by Othman M.N.C., Rahman T.K.A., Mokhlis H., Aman M.M.

    Published 2023
    “…This paper presents an approach to solve the unit commitment problem using a newly developed Multi-agent Evolutionary Programming incorporating Priority List optimisation technique (MAEP-PL). …”
    Article
  16. 16
  17. 17

    Optimal economic load dispatch using multiobjective cuckoo search algorithm by Yasin Z.M., Aziz N.F.A., Salim N.A., Wahab N.A., Rahmat N.A.

    Published 2023
    “…In this paper, Multiobjective Cuckoo Search Algorithm (MOCSA) is developed to solve Economic Load Dispatch (ELD) problem. …”
    Article
  18. 18

    Unit commitment in power system using multi-agent evolutionary programming incorporating priority listing optimisation technique / Muhammad Nazree Che Othman by Che Othman, Muhammad Nazree

    Published 2013
    “…From the result obtained and the comparative study conducted, it is proved that the proposed MAEP-PL optimisation technique has able to solve the unit commitment problem where, the total daily generation cost is effectively minimised and the computation time is reduced as compared to other techniques.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis