Search Results - (( user evaluation modified algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Adapting the conventional packet scheduling algorithms for simultaneous support of 5G multimedia traffic mix by Mohamed Rasied, Thaahirah Shireen, Mohd Ramli, Huda Adibah, Abdul Rahman, Farah Diyana, Najeeb, Athaur Rahman

    Published 2023
    “…The efficiency of the Modified Maximum-Largest Weighted Delay First (M-MLWDF) algorithm was demonstrated via computer simulation where the algorithm supports 112.9% more users over Modified Max-Rate (M-Max-Rate) and Modified Round Robin (M-RR) at the uRLLC QoS targets whilst meeting the target eMBB throughput.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  4. 4

    Adaptive method to improve web recommendation system for anonymous users by Almurtadha, Yahya Mohammed

    Published 2011
    “…As the users‟ interests change over time, the recommender system has the ability to modify the current web navigation profiles and keep them updated. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris by Abubakar Auwal , Idris

    Published 2017
    “…The performance of the developed VRTSA is evaluated and compared with three well-known downlink scheduling algorithms in LTE such as Proportional Fair (PF), Modified Largest Weight Delay First (MLWDF), Exponential Proportional Fair (EXP/PF) as well as recent algorithm called LTTI. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network by Hindia, M.N., Reza, A.W., Noordin, K.A.

    Published 2015
    “…The proposed algorithm is compared with existing algorithms, such as proportional fairness, modified largest weighted delay first, and exponential rule schemes. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    A matlab-based graphical user interface (GUI) to predict the food quality during frying process by Siti Nabihah, Othman

    Published 2022
    “…The user-friendly graphical user interface (GUI) could give a better understanding about frying and was beneficial to food industry players who have limited experience in mathematical model and programming skills.…”
    Get full text
    Thesis
  11. 11

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…However, as many users frequently assess the systems, fingerprints could be replicated and modified by attackers. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  16. 16
  17. 17
  18. 18

    Joint optimization of resources allocation for quality of service aware next-generation heterogeneous cellular networks / Hayder Faeq Rasool Alhashimi by Hayder Faeq Rasool , Alhashimi

    Published 2025
    “…First, a greedy-based user association algorithm is proposed to allocate multiple users to MBS or SBSs to maximize the total sum rate. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Runtime pluggable CPU scheduler for linux operating system by Al-Maweri, Nasr Addin Ahmed Salem

    Published 2010
    “…It also provides a flexible interface for kernel developers which facilitates the evaluation and testing for their newly developed scheduling algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20