Search Results - (( using simulation des algorithm ) OR ( java optimization method algorithm ))

Refine Results
  1. 1

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon, Ahmad, Idawaty

    Published 2016
    “…The main objective of this research is to validate the NIRR algorithm by developing a comprehensive simulation model using Discrete Event Simulation (DES). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon

    Published 2015
    “…The main objective of this research is to validate the NIRR algorithm by developing a comprehensive simulation model using Discrete Event Simulation (DES). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…In this study, MATLAB was used for the simulation and the parameters for the simulation were different size of text file, type of encryption algorithms and type of encryption protocols. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…In addition, Triple Data Encryption Standard (3DES) was also simulated as the encryption algorithm to compare the speedup performance with AES encryption.…”
    Get full text
    Get full text
    Thesis
  10. 10

    A discrete event simulation framework for utility accrual scheduling algorithm in uniprocessor environment by Ahmad, Idawaty, K. Subramaniam, Shamala, Othman, Mohamed, Ahmad Zukarnain, Zuriati

    Published 2011
    “…Successful deployment of the GUS simulator was proven by the generated results. Conclusion: Extensive performance analysis of GUS simulator can be deployed using the developed simulator with low computational overhead. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Distance vector-hop range-free location algorithm for wireless sensor network by Zazali, Azyyati Adiah

    Published 2015
    “…Extensive Discrete Event Simulation (DES) experiments have been conducted to the DV-Hop localization algorithm as one of the typical representative of range-free localization algorithm for the purpose of performance analysis strategy. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Optimize class time tabling by using genetic algorithm technique in UTHM by Ahmad, Izah Rafidah

    Published 2019
    “…This research used genetic algorithm (GA) that was applied to java programming languages with a goal of reducing conflict and optimizing the fitness. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Performance comparison encryption of IPSEC VPN encryption techniques / Nur Hasyimah Mohd Ridzuan by Mohd Ridzuan, Nur Hasyimah

    Published 2015
    “…This paper presents the implementation of site to site VPN tunneling using a network simulator. By varying the combination of encryption algorithm 3DES and AES 256 with two hashing type SHA-1 and MD5, the performance of each algorithm was compared and analyzed via Window 7 environment. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Performance comparison of encryption IPsec VPN encryption techniques / Nur Hasyimah Mohd Ridzuan and Ruhani Ab Rahman by Mohd Ridzuan, Nur Hasyimah, Ab Rahman, Ruhani

    “…This paper presents the implementation of site to site VPN tunneling using a network simulator. By varying the combination of encryption algorithm 3DES and AES 256 with two hashing type SHA-1 and MD5, the performance of each algorithm was compared and analyzed via Window 7 environment. …”
    Get full text
    Get full text
    Article
  18. 18

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…Metaheuristic algorithms have been used successfully for solving different optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
    Get full text
    Get full text
    Get full text
    Article