Search Results - (( _ application ((a algorithm) OR (new algorithm)) ) OR ( things application using algorithm ))*

Refine Results
  1. 1

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH by LUONG, TRUNG TUAN

    Published 2005
    “…New tools based both on clever applications of established algorithms and on new methodologies, empower us to do entirely new things. …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7
  8. 8
  9. 9

    Improving throughput of TCP flows by utilizing TCP-aware backpressure scheduling by Kassim, P. D. M., Muhammed, A., Kadir, M. F. A., Mohamed, M. A., Rahiman, A. R. A., Jamil, N.

    Published 2023
    “…Backpressure algorithm is one of the techniques that can be used to achieve the maximum network throughput policies in wireless environments by routing the traffic over a multi-hop network dynamically using congestion gradient that directing the traffic around a queuing network. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Improving throughput of TCP flows by utilizing TCP-aware backpressure scheduling by Kassim P.D.M., Muhammed A., Kadir M.F.A., Mohamed M.A., Rahiman A.R.A., Jamil N.

    Published 2024
    “…Backpressure algorithm is one of the techniques that can be used to achieve the maximum network throughput policies in wireless environments by routing the traffic over a multi-hop network dynamically using congestion gradient that directing the traffic around a queuing network. …”
    Conference Paper
  12. 12
  13. 13

    A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate by Abdulraheem, Waleed Khalid Amin

    Published 2019
    “…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review by Al-Qadhi, Abdulrahman K., Latip, Rohaya, Chiong, Raymond, Athauda, Rukshan, Hussin, Masnida

    Published 2025
    “…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway by Nurul Saliha A. Ibrahim, Nurul Saliha A. Ibrahim, Faiz A. Saparudin, Faiz A. Saparudin

    Published 2023
    “…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions by Akhlaqi, Mohammad Yahya, Mohd Hanapi, Zurina

    Published 2023
    “…In addition, new technologies such as the Internet of Things (IoT), Autonomous Vehicles (AV), 5G, and Augmented Reality (AR) bring new demands and opportunities that MEC can make possible. …”
    Get full text
    Get full text
    Article
  18. 18

    'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al... by Eka Wahyu, Aditya, Nur Haryani, Zakaria, Fazli, Azzali, Mohamad Nazim, Jambli

    Published 2024
    “…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  19. 19
  20. 20

    'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 T... by Mohamad Nazim, Jambli, Mohamad Zul Haziq, Mohd Fadzli, Sinarwati, Mohamad Suhaili, Nur Haryani, Zakaria

    Published 2024
    “…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter