Search Results - (( java application optimization algorithm ) OR ( attack objective scheduling algorithm ))

Refine Results
  1. 1

    LI-AODV: lifetime improving AODV routing for detecting and removing black-hole attack from VANET by ABDULKADER, ZAID A., Abdullah, Azizol, Abdullah @ Selimun, Mohd Taufik, Ahmad Zukarnain, Zuriati

    Published 2017
    “…To reduce overload in routing process we introduce a scheduling algorithm named Hybrid Round Robin with Highest Response Ratio Next (HRRHRRN). …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6
  7. 7

    OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA by DORE RAJA, ANAND A RAJA

    Published 2004
    “…There is also Reed-Solomon code with the MDS property used in the key schedule; this doesn't add diffusion to the cipher but does add diffusion to the key schedule.) …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali by Ali, Hikma Farah

    Published 2019
    “…Cryptography has wide ranges as it has the ability to handle different attacks. It has a set of security objectives to ensure the confidentiality of data. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Optimization Of Twofish Encryption Algorithm On FPGA by Raja, Ananda Raja Dore, Zain Ali, Noohul Basheer, Hussin, Fawnizu Azmadi

    Published 2005
    “…There is also Reed-Solomon code with the MDS property used in the key schedule; this doesn't add diffusion to the cipher but does add diffusion to the key schedule.) …”
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT by Abdullah, Amran

    Published 2006
    “…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Examination timetabling using genetic algorithm case study: KUiTTHO by Mohd Salikon, Mohd Zaki

    Published 2005
    “…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Examination Timetabling Using Genetic Algorithm Case Study : KUiTTHO by Mohd. Zaki, Mohd. Salikon

    Published 2005
    “…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Improving Class Timetabling using Genetic Algorithm by Qutishat, Ahmed Mohammed Ali

    Published 2006
    “…We have targeted the research on class timetabling problem. Hence, Genetic Algorithm (GA) is used as one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  20. 20