Search Results - (( using modification scheduling algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- using modification »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Graph coloring program of exam scheduling modeling based on bitwise coloring algorithm using python
Published 2022“…Graph coloring has a wide range of applications and is commonly used to solve scheduling issues. In this article, the researchers design an algorithm and apply it to a computer program (Python) to solve graph coloring and to visualize the variation of exam scheduling modeling at Binus University in graphs based on the Bitwise Graph Coloring Algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Reducing Tasks Migration in LRE-TL Real-time Multiprocessor Scheduling Algorithm
Published 2013“…In this paper we present a modification of Local Remaining Execution (LRE-TL) real-time multiprocessor scheduling algorithm to reduce tasks migration significantly. …”
Get full text
Get full text
Conference or Workshop Item -
7
Harmony search algorithm for curriculum-based course timetabling problem
Published 2013“…With proper modification in terms of the approach in this algorithm would make the algorithm perform better on curriculum-based course timetabling.…”
Get full text
Get full text
Get full text
Article -
8
Harmony search algorithm for curriculum-based course timetabling problem
Published 2013“…However, the algorithm produced results that were not comparatively better than those previously known as best solution.With proper modification in terms of the approach in this algorithm would make the algorithm perform better on curriculum-based course timetabling.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A hybrid genetic algorithm for optimization of scheduling workflow applications in heterogeneous computing systems
Published 2016“…The performance of the proposed algorithm is analyzed by using synthesized datasets, and real-world application workflows. …”
Get full text
Get full text
Article -
10
Minimizing Scheduling Overhead In LRE-TL Real-Time Multiprocessor Scheduling Algorithm
Published 2015“…In this paper, we present a modification of Local Remaining Execution-Time and Local time domain (LRE-TL) real-time multiprocessor scheduling algorithm, aimed at reducing the scheduling overhead in terms of task migrations. …”
Get full text
Get full text
Article -
11
-
12
Hybrid genetic algorithm for uncapacitated university examination timetabling problem
Published 2015“…All proposed algorithms are coded in C using Microsoft Visual C++ 6.0 as the compiler. …”
Get full text
Get full text
Thesis -
13
Minimizing scheduling overhead in LRE-TL real-time multiprocessor scheduling algorithm
Published 2017“…In this paper, we present a modification of the local remaining execution-time and local time domain (LRE-TL) real-time multiprocessor scheduling algorithm, aimed at reducing the scheduling overhead in terms of task migrations. …”
Get full text
Get full text
Article -
14
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
15
File integrity monitor scheduling based on file security level classification
Published 2011“…File integrity monitoring tools are widely used to detect any malicious modification to these critical files. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Optimized scheduling for an airconditioning system based on indoor thermal comfort using the multiobjective improved global particle swarm optimization
Published 2018“…The main contribution of this paper is a new optimized AC scheduling approach that focuses on indoor thermal comfort using a new multi-objective optimization algorithm, called the improved global particle swarm optimization (IGPSO), which able to find better optimal solutions faster than its original version, the global particle swarm optimization (GPSO) algorithm. …”
Get full text
Get full text
Article -
17
Hybrid genetic algorithm with multi-parents recombination for job shop scheduling problems / Ong Chung Sin
Published 2013“…This mechanism is restricted to search the possible solutions in a critical path. Modification on the path by using neighborhood search significantly reduces the total length of the makespan. …”
Get full text
Get full text
Get full text
Thesis -
18
Local search approaches for patient scheduling problem in parallel operating theatre
Published 2020“…In the first phase, pre-processing stage, combination of pre-processing stage with low-level heuristic and genetic algorithm are used.The different types of LS are applied in the second phase of scheduling. …”
Get full text
Get full text
Thesis -
19
Evalution of binary simulated Kalman filter and its application on airport gate scheduling
Published 2016Get full text
Get full text
Undergraduates Project Papers -
20
Modification of particle swarm optimization algorithm for optimization of discrete values
Published 2011“…We propose a novel modification to the PSO algorithm to perform rapid discrete optimization. …”
Get full text
Get full text
Research Reports
