Search Results - (( using scheme based algorithm ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- using algorithm »
- using scheme »
- scheme based »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Secure scheme for user authentication and authorization in android environment
Published 2013“…Keeping in viewpoint of security on effective authentication and authorization, this paper proposes a technique that exponentially minimizes the operational cost by using secure hash algorithms that has the potential to generate mobile-based One Time Passwords (OTPs) scheme on Android environment ensuring enhanced protection with respect to password security. …”
Get full text
Get full text
Get full text
Article -
3
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
4
-
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
-
7
-
8
Quality of service management algorithms in WiMAX networks
Published 2015“…This scheme determines an admission criteria based on scheduling service classes. …”
Get full text
Get full text
Thesis -
9
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…In the proposed HATSC scheme, the AHP method is uese for criteria weighting, while the TOPSIS method uses for the selection technique based on a multi-criteria decision-making algorithm is proposed. …”
Get full text
Get full text
Thesis -
10
Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS
Published 2014“…In addition, the ICA-based scheme also indicates promising convergence and time running performance as compared to other schemes.…”
Get full text
Get full text
Conference or Workshop Item -
11
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Published 2023“…A secure hybrid scheme introduces a new design architecture of the symmetric AES algorithm to encrypt the MQTT payload called “D-AES”. …”
Get full text
Get full text
Thesis -
12
Application Of Higher Order Compact Finite Difference Methods To Problems In Fluid Dynamics
Published 2003“…Third, only the numerical algorithm based on Hermitian scheme is used to solve the flow past a backward-facing step. …”
Get full text
Get full text
Thesis -
13
A reinforcement learning-based energy-efficient spectrum-aware clustering algorithm for cognitive radio wireless sensor network
Published 2016“…Performance comparisons of the RL based clustering scheme with Groupwise spectrum-aware clustering scheme show that an energy savings of9% and PU detection performance improvement of 11.6% can be achieved. …”
Get full text
Get full text
Thesis -
14
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
16
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
17
Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network
Published 2014“…The forward and backward secrecy of the proposed scheme has been extensively validated by formal method using rank theorem. …”
Get full text
Get full text
Get full text
Article -
18
Post quantum signature schemes for the block chain technology
Published 2019“…First we study the different properties and uses of signature schemes, and how Elliptic Curve Digital Signature Algorithm is used in the blockchain technology. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Mobility management schemes based on multiple criteria for optimization of seamless handover in long term evolution networks
Published 2014“…The second scheme is cell selection based on multiple criteria decision making (MCDM) approach. …”
Get full text
Get full text
Thesis -
20
Differential evolution based special protection and control scheme for contingency monitoring of transmission line overloading
Published 2017“…In this paper, a Special Protection and Control Scheme (SPCS) based on Differential Evolution (DE) algorithm for optimal generation rescheduling to mitigate line overloads in contingency conditions has been presented. …”
Get full text
Get full text
Conference or Workshop Item
