Search Results - (( developing solution ((sdn algorithm) OR (_ algorithm)) ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). The main motivation for this research is to assist Sabah Electricity Sdn. …”
    Conference Paper
  7. 7

    Secure address resolution protocol proxy in software defined network by Munther, Munther Numan

    Published 2018
    “…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A multi-objective routing mechanism for energy management optimization in SDN multi-control architecture by Ibrahim, Abeer A. Z., Hashim, Fazirulhisyam, Sali, Aduwati, Noordin, Nor K., Fadul, Saber M. E.

    Published 2022
    “…Since the formulated energy-aware routing algorithm is designed as a multi-objective NP-hardness of the problem, a heuristic approach is developed to find optimal solutions for traffic routing between inter-controllers and controller-switch in terms of energy-aware consumption strategies. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…This thesis provides solutions to enhance the WLS algorithm in order to increase the performance of SE. …”
    Get full text
    Get full text
    Thesis
  13. 13

    SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges by Hussein N.H., Koh S.P., Yaw C.T., Tiong S.K., Benedict F., Yusaf T., Kadirgama K., Hong T.C.

    Published 2025
    “…SDVN routing algorithms are uniquely classified according to various criteria. …”
    Article
  14. 14

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…We perform a rigorous evaluation of the proposed method by testing using Floodlight and Mininet to emulate SDN setting. We model the solution in the real setting of SDNs using High Level Petri Nets (HLPN), analyze the rules with Z language, and formally verified the correct functioning using Z3 SMT solver. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Predictive analytics for pacemaker medical instrument stock management of Transmedic Healthcare by Nawawi, Nafiz Danial

    Published 2025
    “…The research applies the CRISP-DM methodology, examining current stock processes, and then collecting and cleansing historical data to develop Always Better Control (ABC) for stock analysis and predictive models using classification and also making a comparison between three algorithms, which are Naive Bayes, Random Forest and Decision Tree. …”
    Get full text
    Get full text
    Student Project
  16. 16
  17. 17

    Overview of metaheuristic: classification of population and trajectory by Zainul Rashid, Zarina

    Published 2010
    “…Some algorithms can be defined if the developer of the system has problem specific knowledge to the solution. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Solving transcendental equation using genetic algorithm / Masitah Hambari by Masitah , Hambari

    Published 2004
    “…The most critical task for developing this project is how to encode the algorithm based on the domain, Transcendental Equation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Enhancement of Ant System Algorithm for Course Timetabling Problem by Djamarus, Djasli

    Published 2009
    “…This research starts with developing an algorithm based on original concept of Ant System Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Development of improved metaheuristic algorithms for modelling and control of a flexible manipulator system by Nasir, Ahmad Nor Kasruddin, Ahmad, Mohd Ashraf, Raja Ismail, R. M.T., Muhammad Hamka, Embong

    Published 2019
    “…The aim of the single type algorithms is to improve the algorithms capability to find an optimal solution. …”
    Get full text
    Get full text
    Research Report