Search Results - (( java application optimized algorithm ) OR ( using message optimization algorithm ))
Search alternatives:
- message optimization »
- optimized algorithm »
- java application »
-
1
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
2
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
3
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The second step is to apply the hash method on this message by using shuffle mechanism. Now the message is ready to do the encryption process that is dividing the text message to 128 8-bit for each four sub keys, so if the text message less than 128 8-bit then use another sub key. …”
Get full text
Get full text
Thesis -
4
New approach of cryptography algorithm for e- mail applications
Published 2005“…The second step is to apply the hash method on this message by using shuffle mechanism. Now the message is ready to do the encryption process that is dividing the text message to 128 8-bit for each eight sub keys, so if the text message less than 128 8-bit then use another sub key. …”
Get full text
Get full text
Conference or Workshop Item -
5
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
6
Enhancing Market-Based Scheduling Algorithm on Globally Distributed Web Servers Using Least Suitable Sealed Bid Technique
Published 2006“…These agents work cooperatively with each other through the Internet using message exchanging.An improved algorithm was implemented to decrease the amount of message exchanging between agents, which increased the performance of the system.…”
Get full text
Get full text
Thesis -
7
-
8
Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm
Published 2024“…Third, this work uses IPSO to optimize the initial network parameters of 1DCNN to build IPSO-1DCNN. …”
Get full text
Get full text
Article -
9
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
10
An improved simulated annealing algorithm to avoid crosstalk in optical omega network
Published 2006“…It is a good idea to use these two algorithms to improve the performance. …”
Get full text
Get full text
Conference or Workshop Item -
11
Spam classification based on supervised learning using grasshopper optimization algorithm and artificial neural network
Published 2021“…The main idea of this research is to train a neural network by leveraging a new nature-inspired metaheuristic algorithm referred to as a Grasshopper Optimization Algorithm (GOA) to categorize emails as ham and spam. …”
Get full text
Get full text
Conference or Workshop Item -
12
Vehicle communications: Sensitive node election SNE algorithm achieves optimized QoS
Published 2026“…This paper presents a Sensitive Node Election (SNE) algo- rithm adapted to routing protocols in certain opportunistic network environments. The algorithm focuses on selecting the best agent for communication using an innovative approach for message forwarding. …”
Get full text
Get full text
Get full text
Article -
13
Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin
Published 2019“…This research used Least Significant Bits (LSB) as the algorithm to embed the messages. …”
Get full text
Get full text
Student Project -
14
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…To overcome these limitations, this study proposes a technique known as an n-decomposition genetic algorithm. This algorithm uses a variable-length search to identify the best location to embed the secret message by incorporating constraints to avoid local minimum traps. …”
Get full text
Get full text
Get full text
Thesis -
15
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
16
An efficient network mobility management for a 6LoWPAN mobile network in hospital environments
Published 2017“…Then, by using the proposed message-scheduling algorithm, end-to-end delay in NEMO-HWSN is reduced by approximately 20%. …”
Get full text
Get full text
Thesis -
17
New synchronization protocol for distributed system with TCP extension
Published 2013“…Faulty processes may cause some other active processes to become inactive during the queuing or within the using a critical section time. In addition, the system requires adding some messages to avoid starvation and deadlock. …”
Get full text
Get full text
Thesis -
18
-
19
A novel and high capacity audio steganography algorithm based on adaptive data embedding positions
Published 2023“…This process help to provide optimal locations to hide the message blocks. These locations are considered as a stego-key that is ciphered and hided within the final detail sub-band which is specified for this purpose. …”
Article -
20
