Search Results - (( network implementation new algorithm ) OR ( java application using algorithm ))
Search alternatives:
- network implementation »
- implementation new »
- java application »
- using algorithm »
- new algorithm »
-
1
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Network monopoly / Tan Kean Yeap
Published 2002“…The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
Get full text
Get full text
Thesis -
3
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
6
Traffic management algorithms for LEO satellite networks
Published 2016“…By minimizing the link shared between those traffics, the performance of UDP traffic which carries delay sensitive data could be improved. Since TCP WestwoodNew is designed to be implemented in wired and wireless network environment, there are few drawbacks when TCP WestwoodNew is implemented in the satellite network environment. …”
Get full text
Get full text
Get full text
Thesis -
7
An enhanced congestion control algorithm for LEO satellite networks
Published 2018“…Since TCP WestwoodNew is designed to be implemented in wired and wireless network environment, there are few drawbacks found when TCP WestwoodNew is implemented in the satellite network environment. …”
Get full text
Get full text
Get full text
Article -
8
A new fair marker algorithm for DiffServ networks
Published 2008“…The paper design and implement the algorithm with extensive simulations using NS-2 simulator to compare the proposed algorithm with previous algorithms. …”
Get full text
Get full text
Article -
9
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
10
Cohesive token passing algorithm utilizing software agents
Published 2010“…This encompasses the implementation in the area of Wave Division Multiplexing (WDM) networks and Mobile Adhoc Networks (MANET). …”
Get full text
Get full text
Article -
11
-
12
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
13
A new congestion control algorithm for active networks
Published 2005Get full text
Get full text
Article -
14
Implementation of a new Preference Based Final Year Project title selection system for undergraduate engineering students in UNITEN
Published 2023“…The new system, dubbed the Preference Based system, uses a computer algorithm to allocate titles to students based on students' submissions of their 10 most preferred titles in order of preference. …”
Article -
15
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…In this thesis, I2tswTCM is proposed as an enhanced version of the famous tswTCM marker scheme used in the current DiffServ architecture, this new algorithm improves fairness in the excess bandwidth among different aggregates in a DiffServ networks and it has a better fairness than all other algorithms for different network provision levels. …”
Get full text
Get full text
Thesis -
16
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Thus the authenticity and privacy of the information transmitted and the data received on networked computers is of utmost importance. The deployment of network security procedures requires the implementation of Cryptographic algorithms. …”
Get full text
Get full text
Thesis -
17
The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2010“…Now and after got this results as low delay for bottleneck link case, we know the New-AIMD mechanism work as well under the network condition in the experiments.…”
Get full text
Get full text
Article -
18
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Reducing the calculation time of the algorithm, in sequential and parallel platforms, using the doubling-rule technique combined with a new scheme led to a strong improvement of the LUC algorithm speed. …”
Get full text
Get full text
Thesis -
19
Y-type Random 2-satisfiability In Discrete Hopfield Neural Network
Published 2024“…Next, the newly proposed logical rule as the symbolic instruction was implemented into the Discrete Hopfield Neural Network to govern the neurons of the network. …”
Get full text
Get full text
Thesis -
20
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…I used different types of optimization algorithms to improve the performance of the neural networks. …”
Get full text
Get full text
Thesis
