Search Results - (( java application using algorithm ) OR ( network implementation new algorithm ))

Refine Results
  1. 1

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…By minimizing the link shared between those traffics, the performance of UDP traffic which carries delay sensitive data could be improved. Since TCP WestwoodNew is designed to be implemented in wired and wireless network environment, there are few drawbacks when TCP WestwoodNew is implemented in the satellite network environment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    An enhanced congestion control algorithm for LEO satellite networks by Ayob, Fahrul Hakim, Subramaniam, Shamala, Othman, Mohamed, Zulkarnain, Zuriati

    Published 2018
    “…Since TCP WestwoodNew is designed to be implemented in wired and wireless network environment, there are few drawbacks found when TCP WestwoodNew is implemented in the satellite network environment. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A new fair marker algorithm for DiffServ networks by Elshaikh, M.A., Mohamed, Othman, Subramaniam, Shamala, Md. Desa, Jalil

    Published 2008
    “…The paper design and implement the algorithm with extensive simulations using NS-2 simulator to compare the proposed algorithm with previous algorithms. …”
    Get full text
    Get full text
    Article
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…This encompasses the implementation in the area of Wave Division Multiplexing (WDM) networks and Mobile Adhoc Networks (MANET). …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14

    Implementation of a new Preference Based Final Year Project title selection system for undergraduate engineering students in UNITEN by Hasan M.H., Mohamed Sahari K.S., Anuar A.

    Published 2023
    “…The new system, dubbed the Preference Based system, uses a computer algorithm to allocate titles to students based on students' submissions of their 10 most preferred titles in order of preference. …”
    Article
  15. 15

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…In this thesis, I2tswTCM is proposed as an enhanced version of the famous tswTCM marker scheme used in the current DiffServ architecture, this new algorithm improves fairness in the excess bandwidth among different aggregates in a DiffServ networks and it has a better fairness than all other algorithms for different network provision levels. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…Thus the authenticity and privacy of the information transmitted and the data received on networked computers is of utmost importance. The deployment of network security procedures requires the implementation of Cryptographic algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm. by Jasem, Hayder Natiq, Ahmad Zukarnain, Zuriati, Mohamed, Othman, Subramaniam, Shamala

    Published 2010
    “…Now and after got this results as low delay for bottleneck link case, we know the New-AIMD mechanism work as well under the network condition in the experiments.…”
    Get full text
    Get full text
    Article
  18. 18

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Reducing the calculation time of the algorithm, in sequential and parallel platforms, using the doubling-rule technique combined with a new scheme led to a strong improvement of the LUC algorithm speed. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Y-type Random 2-satisfiability In Discrete Hopfield Neural Network by Guo, Yueling

    Published 2024
    “…Next, the newly proposed logical rule as the symbolic instruction was implemented into the Discrete Hopfield Neural Network to govern the neurons of the network. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…I used different types of optimization algorithms to improve the performance of the neural networks. …”
    Get full text
    Get full text
    Thesis