Search Results - (( user relation based algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Energy-efficient communications in wireless powered cognitive radio networks based on game theory / Fadhil Mukhlif Aswad Al-Obaidy by Fadhil Mukhlif , Aswad Al-Obaidy

    Published 2020
    “…Furthermore, the convergence rate of these algorithms is relatively fast which can help in guaranteeing that all users achieve their required QoS. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…A new case is retained in the case base for future retrievals. A framework user is allowed to select from a list of features provided by the framework that he or she is interested in learning, and the system will give an example of application related to the selected features. …”
    Conference paper
  4. 4
  5. 5

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…In this thesis, the research gap related to the accuracy of authenticating a legitimate user is brought to light. …”
    text::Thesis
  6. 6

    Utility-based non-cooperative power control game in wireless environment / Yousef Ali Mohammed Al-Gumaei by Yousef Ali, Mohammed Al-Gumaei

    Published 2017
    “…Moreover, these algorithms have a relatively fast convergence rate and guarantee that all users can achieve their required QoS.…”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Three hundred scenarios involving various parameters related to base stations, cloudlets, users, and wireless communications were generated. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancement of RSA Key Generation Using Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman, Mohd Fadhil, Ramle

    Published 2015
    “…The purpose of this paper is to enhance previous algorithm called Tripathi algorithm. The Tripathi algorithm proposes an RSA based algorithm to generate cryptographic keys using user identity such as email address of a person. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  9. 9

    The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi by Mohd Radzi, Mohamad Khairul Ikhwan

    Published 2017
    “…In other words, dijkstra algorithm used to find the best route to arrive at the every company that are related for this project. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Channel-aware downlink scheduling for quality of service in long term evolution network by Najim, Alaa Omer

    Published 2018
    “…Initially, a range of constraints was defined based on a recent algorithm from the literature, namely Delay Based Weighted Proportional Fair (DBWPF). …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Alfred, Rayner, Loo, Yew Jie, Obit, Joe Henry, Lim, Yuto, Haviluddin, Haviluddin, Azman, Azreen

    Published 2021
    “…Everyday, more contents related to social media are generated by social media users (e.g., Facebook, Twitter). …”
    Get full text
    Get full text
    Article
  12. 12

    A Multi-Criteria Recommendation Technique for Personalized Tourism Experiences by Mustafa, Payandenick, Yin Chai, Wang

    Published 2025
    “…In this context, recommendation systems and information dissemination are closely related. Recommendation systems use algorithms to analyze user data and provide personalized recommendations based on their past behaviour and preferences. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…The developed system shall be able generated music based on a genetic algorithm, where users can define basic parameters including the instrument used to play the music, tempo, number of generated notes, and the number of measures to generate. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    A Rule Extraction Algorithm That Scales Between Fidelity and Comprehensibility by Muthu Anbananthen, Kalaiarasi Sonai, Chan, Fabian Huan Pheng*, Subramaniam, Subhacini, Eimad Eldin, Abdu Ali Abusham

    Published 2012
    “…However, these two measures are found to be inverse relations of one another. Since the needs of comprehensibility or fidelity may vary depending on the user or application, this paper presented a significance based rule extraction algorithm that allows a user set parameter to scale between the desired degree of fidelity and comprehensibility of the rules extracted. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Design and development of the network interface, packets scheduling and interference mitigation schemes for LTE-based femtocell networks / Sinan Ghassan Abid Ali by Ali, Sinan Ghassan Abid

    Published 2016
    “…The proposed RBP scheduling algorithm outperforms the well-known scheduling algorithms in terms of a lower PLR among users in the LTE based femtocell network. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…The need to meet the quality of service (QoS) requirements for this rapidly expanding user base, particularly with heightened data rate expectations, underscores the urgency for innovative solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Block based low complexity iterative QR precoder structure for Massive MIMO by Mok, Li Suet

    Published 2021
    “…As the user terminals have strict restraints on physical dimensions, processing capabilities and power availability are extremely limited (relative to the base station). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Rayner Alfred, Loo Yew Jie, Joe Henry Obit, Yuto Lim, Haviluddin Haviluddin, Azreen Azman

    Published 2021
    “…Everyday, more contents related to social media are generated by social media users (e.g., Facebook, Twitter). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article