Search Results - (( user relation based algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- relation based »
- user relation »
-
1
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
2
Energy-efficient communications in wireless powered cognitive radio networks based on game theory / Fadhil Mukhlif Aswad Al-Obaidy
Published 2020“…Furthermore, the convergence rate of these algorithms is relatively fast which can help in guaranteeing that all users achieve their required QoS. …”
Get full text
Get full text
Get full text
Thesis -
3
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…A new case is retained in the case base for future retrievals. A framework user is allowed to select from a list of features provided by the framework that he or she is interested in learning, and the system will give an example of application related to the selected features. …”
Conference paper -
4
Malaysia Constitutional Law System, Study On The Use Advanced Searching Algorithm (Rule-Based And Horspool Algorithm)
Published 2017“…We hope after build the intelligent web based system can solved the problem that user's faced.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…In this thesis, the research gap related to the accuracy of authenticating a legitimate user is brought to light. …”
text::Thesis -
6
Utility-based non-cooperative power control game in wireless environment / Yousef Ali Mohammed Al-Gumaei
Published 2017“…Moreover, these algorithms have a relatively fast convergence rate and guarantee that all users can achieve their required QoS.…”
Get full text
Get full text
Get full text
Thesis -
7
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Three hundred scenarios involving various parameters related to base stations, cloudlets, users, and wireless communications were generated. …”
Get full text
Get full text
Thesis -
8
Enhancement of RSA Key Generation Using Identity
Published 2015“…The purpose of this paper is to enhance previous algorithm called Tripathi algorithm. The Tripathi algorithm proposes an RSA based algorithm to generate cryptographic keys using user identity such as email address of a person. …”
Get full text
Get full text
Get full text
Book Chapter -
9
The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi
Published 2017“…In other words, dijkstra algorithm used to find the best route to arrive at the every company that are related for this project. …”
Get full text
Get full text
Thesis -
10
Channel-aware downlink scheduling for quality of service in long term evolution network
Published 2018“…Initially, a range of constraints was defined based on a recent algorithm from the literature, namely Delay Based Weighted Proportional Fair (DBWPF). …”
Get full text
Get full text
Get full text
Thesis -
11
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Everyday, more contents related to social media are generated by social media users (e.g., Facebook, Twitter). …”
Get full text
Get full text
Article -
12
A Multi-Criteria Recommendation Technique for Personalized Tourism Experiences
Published 2025“…In this context, recommendation systems and information dissemination are closely related. Recommendation systems use algorithms to analyze user data and provide personalized recommendations based on their past behaviour and preferences. …”
Get full text
Get full text
Get full text
Thesis -
13
Real-time algorithmic music composition application.
Published 2022“…The developed system shall be able generated music based on a genetic algorithm, where users can define basic parameters including the instrument used to play the music, tempo, number of generated notes, and the number of measures to generate. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
A Rule Extraction Algorithm That Scales Between Fidelity and Comprehensibility
Published 2012“…However, these two measures are found to be inverse relations of one another. Since the needs of comprehensibility or fidelity may vary depending on the user or application, this paper presented a significance based rule extraction algorithm that allows a user set parameter to scale between the desired degree of fidelity and comprehensibility of the rules extracted. …”
Get full text
Get full text
Get full text
Article -
15
Design and development of the network interface, packets scheduling and interference mitigation schemes for LTE-based femtocell networks / Sinan Ghassan Abid Ali
Published 2016“…The proposed RBP scheduling algorithm outperforms the well-known scheduling algorithms in terms of a lower PLR among users in the LTE based femtocell network. …”
Get full text
Get full text
Thesis -
16
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…The need to meet the quality of service (QoS) requirements for this rapidly expanding user base, particularly with heightened data rate expectations, underscores the urgency for innovative solutions. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
Block based low complexity iterative QR precoder structure for Massive MIMO
Published 2021“…As the user terminals have strict restraints on physical dimensions, processing capabilities and power availability are extremely limited (relative to the base station). …”
Get full text
Get full text
Thesis -
19
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
20
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Everyday, more contents related to social media are generated by social media users (e.g., Facebook, Twitter). …”
Get full text
Get full text
Get full text
Get full text
Article
