Search Results - (( developing mode efficient algorithm ) OR ( java validation using algorithm ))

Refine Results
  1. 1

    A parallel XTS encryption mode of operation by Alomari, Mohammad Ahmed, Samsudin, Khairulmizam, Ramli, Abdul Rahman

    Published 2009
    “…Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Implementation of a parallel XTS encryption mode of operation by Alomari, Mohammad Ahmed, Samsudin, Khairulmizam, Ramli, Abdul Rahman

    Published 2014
    “…Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…These limitations in XTS have been successfully overcome by the enhanced parallel XTS mode of operation which gives a 1.80 speedup factor with 90 percent efficiency using AES as an encryption algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Moreover, an improved sleep mode control algorithm has been introduced to reduce the high energy consumption of the standard sleep mode algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…The present study proposes an efficient DDoS attack detection model. This model relies mainly on dimensionality reduction and machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…The present study proposes an efficient DDoS attack detection model. This model relies mainly on dimensionality reduction and machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…The present study proposes an efficient DDoS attack detection model. This model relies mainly on dimensionality reduction and machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…The present study proposes an efficient DDoS attack detection model. This model relies mainly on dimensionality reduction and machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…The present study proposes an efficient DDoS attack detection model. This model relies mainly on dimensionality reduction and machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  11. 11

    New algorithm for gyroless spacecraft angular rate Estimation and its application by Abdelrahman, Mohammad, Samaan, Malak A.

    Published 2006
    “…A new algorithm for estimating the angular velocity using quaternion measurements is developed based on the concept of the global optimality resulting when using a centralized or master Kalman filter. …”
    Get full text
    Get full text
    Article
  12. 12

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    QR factorization equalisation scheme for mode devision multiplexing transmission in fibre optics by Abbas, Sharafal-Deen Abdulkadhum

    Published 2016
    “…This is done by trying to avoid the issues accompanied with the development of the previous algorithms that have been utilized for the same goal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers by Khoshkholghi, Mohammad Ali, Derahman, Mohd Noor, Abdullah, Azizol, Subramaniam, Shamala, Othman, Mohamed

    Published 2017
    “…The aim is to improve the utilization of computing resources and reduce energy consumption under SLA constraints regarding CPU, RAM, and bandwidth. The efficiency of the proposed algorithms is validated by conducting extensive simulations. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Modelling and optimization of a transit services with feeder bus and rail system / Mohammadhadi Almasi by Mohammadhadi, Almasi

    Published 2015
    “…In this study, optimized transit services and coordinated schedules are developed using metaheuristic algorithms such as genetic algorithm (GA), particle swarm optimization (PSO), water cycle algorithm (WCA) and imperialist competitive algorithm (ICA). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Intelligent PID Controller Tuned by Bacterial Foraging Optimization Algorithm for Vibration Suppression of Horizontal Flexible Structure by Aizat Ikmal, Abd Raof, Muhamad Sukri, Hadi, Intan Zaurah, Mat Darus, Annisa, Jamali, Mat Hussin, Ab Talib, Hanim, Mohd Yatim

    Published 2022
    “…BFO is a metaheuristic approach categorized as an evolutionary algorithm recently developed, and a nature-inspired optimization algorithm. …”
    Get full text
    Get full text
    Proceeding
  18. 18

    Development of sorting system for oil palm in vitro shoots using machine vision approach by Al-Ruhaimi, Hamdan Yahya Ahmed

    Published 2014
    “…Close results between the performance of the developed sorting algorithm and SVM algorithm demonstrate that it is satisfactory and efficient. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Space vehicles dynamics and control by Mohammad Abdelrahman, Mohammad Ibraheem

    Published 2011
    “…In both modes the active magnetic control algorithms have been introduced and developed. …”
    Get full text
    Get full text
    Get full text
    Book