Search Results - (( java application using algorithm ) OR ( program program service algorithm ))

Refine Results
  1. 1

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library consists of cryptographic algorithms that include symmetric and asymmetric encryptions, key exchange, hashing algorithms and digital signature algorithms. …”
    Get full text
    Get full text
    Get full text
    Monograph
  2. 2

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The proliferation of high speed wireless technologies and mobile computing infrastructures has fostered a rapid development in location based services. The key to the success of location based services is the estimation of user’s location. …”
    Get full text
    Get full text
    Thesis
  6. 6

    System program management environment in cloud computing using hybrid Genetic Algorithm and Moth Flame Optimization (GA-MFO) by Mohd Erwan Mazalan

    Published 2022
    “…This project present a system program algorithm based on Moth Flame Optimization (MFO) algorithm to assign an optimal set of system program to meet the satisfaction of quality of service requirements of cloud computing in such a way that the total execution time of tasks is minimized. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach by Gholizadeh, Somayyeh

    Published 2018
    “…This approach tunes the parameters of the linear programming models that are used in the other algorithms by using a dynamic element. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…AES is a data encryption technique that exist in the world with as currently the most secured algorithms. AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An Integer Linear Programming model and Adaptive Genetic Algorithm approach to minimize energy consumption of Cloud computing data centers by Ibrahim, Huda, Aburukba, Raafat O., El-Fakih, Khaled

    Published 2018
    “…This paper focuses on the development of a dynamic task scheduling algorithm by proposing an Integer Linear Programming (ILP) model that minimizes the energy consumption in a Cloud data center. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Formulating and solving stochastic truck and trailer routing problems using meta-heuristic algorithms / Seyedmehdi Mirmohammadsadeghi by Seyedmehdi, Mirmohammadsadeghi

    Published 2015
    “…For solving TTRP, a variety of algorithms have been applied earlier but TTRPSD programming has not yet solved. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20