Search Results - (( developing function affect algorithm ) OR ( java communication can algorithm ))

Refine Results
  1. 1

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…SANAsms is capable to send confidential encrypted information in SMS via normal GSM and it only can be read by person who can decrypt it. Currently, normal SMS using GSM communication is not secured and safe enough. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…At present, banking,commerce and passwords can only be communicated with internet connection or as in person verbally or in written;Text Messaging Encryption system needs to overcome this intermediate subjects and deliver instructions or messages instantaneously and securely. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5
  6. 6
  7. 7

    Ant colony optimization algorithm for dynamic scheduling of jobs in computational grid by Ku-Mahamud, Ku Ruhana, Ramli, Razamin, Yusof, Yuhanis, Mohamed Din, Aniza, Mahmuddin, Massudi

    Published 2012
    “…In computational grid, job scheduling is one of the main factors affecting grid computing performance. Job scheduling problem is classified as an NP-hard problem.Such a problem can be solved only by using approximate algorithms such as heuristic and meta-heuristic algorithms.Among different optimization algorithms for job scheduling, ant colony system algorithm is a popular meta-heuristic algorithm which has the ability to solve different types of NP-hard problems.However, ant colony system algorithm has a deficiency in its heuristic function which affects the algorithm behavior in terms of finding the shortest connection between edges.This research focuses on a new heuristic function where information about recent ants’ discoveries has been considered.The new heuristic function has been integrated into the classical ant colony system algorithm.Furthermore, the enhanced algorithm has been implemented to solve the travelling salesman problem as well as in scheduling of jobs in computational grid.A simulator with dynamic environment feature to mimic real life application has been development to validate the proposed enhanced ant colony system algorithm. …”
    Get full text
    Get full text
    Monograph
  8. 8
  9. 9

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…Political analysts often communicate with the public and exchange information through the social media platform. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The provider, which is an open source library, is used to provide the secure communication channel. The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Semiparametric inference procedure for the accelarated failure time model with interval-censored data by Karimi, Mostafa

    Published 2019
    “…The rank-based methods, estimating algorithms, and resampling techniques that are developed do not involve the difficulties of the existing estimating procedures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…Another proposed algorithm is replica placement algorithm which selects and places only one replica in each cluster. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Secure scheme for user authentication and authorization in android environment by Dar, Humaira, Al-Khateeb, Wajdi Fawzi Mohammed, Habaebi, Mohamed Hadi

    Published 2013
    “…Experimented on java platform, the implementation techniques discussed in the paper are found to be very robust…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement by Abdul Rahman, Nor Farahaida

    Published 2016
    “…Nevertheless, it has limited function in which it requires a supported conventional synchronization algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development of automatic pest sampling and detection system for cash crops by Hadi, Mustafa Kareem

    Published 2019
    “…Different kernel functions such as disk, diamond, square, and sphere are used as matching functions for insect detection and counting algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults by Mat Isa, Masnita

    Published 2012
    “…March tests are developed based on functional fault model (FFM) such as stuck-at faults (SAFs), transition faults (TFs) and coupling faults (CFs). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…The NLFXLMS algorithm is a stochastic gradient algorithm that incorporates the derivative of a nonlinear plant model which is represented by the scaled error function (SEF) in the controller design. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis