Search Results - (( java implication force algorithm ) OR ( based computing new algorithm ))

Refine Results
  1. 1

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    A priority based job scheduling algorithm in cloud computing by Shamsollah, Ghanbari, Othman, Mohamed

    Published 2012
    “…Some intensive researches have been done in the area of job scheduling of cloud computing. In this paper we have proposed a new priority based job scheduling algorithm (PJSC) in cloud computing. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…It is based on Addition Chain. The computation time for existing and new algorithms will be recorded. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Fairness Of the TCP-based new AIMD congestion control algorithm. by Jasem, Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, K. Subramaniam, Shamala

    Published 2009
    “…Our control model is based on the assumption of the original AIMD algorithm; we show that both efficiency and fairness of AIMD can be improved. …”
    Get full text
    Get full text
    Article
  8. 8

    New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field by Md Yasin, Sharifah

    Published 2011
    “…The new scalar representation is in base 2 using digit 0, 1 and 3. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Optimizing large scale combinatorial problems using multiple ant colonies algorithm based on pheromone evaluation technique by Aljanaby, Alaa, Ku-Mahamud, Ku Ruhana, Md Norwawi, Norita

    Published 2008
    “…The new algorithm can effectively be used to tackle large scale optimization problems.Computational tests show promises of the new algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    The TCP-based new AIMD congestion control algorithm by Jasem, Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, Subramaniam, Shamala

    Published 2008
    “…Our control model is based on the assumption of the original AIMD algorithm; we show that both efficiency and fairness of AIMD can be improved. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A new variable strength t-way strategy based on the cuckoo search algorithm by Abdullah, Nasser, Kamal Z., Zamli

    Published 2019
    “…Complementing existing works, this paper proposes a new variable strength cuckoo search algorithm, called VCS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Estimation-based Metaheuristics: A New Branch of Computational Intelligence by Nor Hidayati, Abd Aziz, Zuwairie, Ibrahim, Saifudin, Razali, Nor Azlina, Ab. Aziz

    Published 2016
    “…In this paper, a new branch of computational intelligence named estimation-based metaheuristic is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A Focal load balancer based algorithm for task assignment in cloud environment by Mohammed, Mostafa Abdulghfoor, Hasan, Raed Abdulkareem, Ahmed, Munef Abdullah, Tapus, Nicolae, Shnan, Marwan Ali, Khaleel, M. K., Ali, Ahmed H.

    Published 2019
    “…Comparisons with the krill-LB and agent-based algorithms show that the new system provides a reduction in average wait time, a significant increase in throughput, and a dramatic reduction in CPU time consumption.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…LUC cryptosystem algorithm based on the quadratic and cubic polynomial, is introduced in this thesis with a new formula to distinguishing between the cubic polynomial roots. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Semiparametric inference procedure for the accelarated failure time model with interval-censored data by Karimi, Mostafa

    Published 2019
    “…A computationally simple two-step iterative algorithm, called estimationapproximation algorithm, is introduced for estimating the parameters of the model on the basis of the rank estimators. …”
    Get full text
    Get full text
    Get full text
    Thesis