Search Results - (( _ application ((rsa algorithm) OR (max algorithm)) ) OR ( its application based algorithm ))
Search alternatives:
- application based »
- rsa algorithm »
- max algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX.
Published 2013“…In this paper, a fuzzy logic based self-adaptive handover (FuzSAHO) algorithm is introduced. …”
Get full text
Get full text
Article -
3
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…To address these problems, this research proposes three new distributed static batch mode inspired algorithms. The first (proposed) algorithm is based on Min-Min, called Min-Diff, the second algorithm is based on Max-Min, called Max-Average, and the third algorithm is to handle the load balancing, called Efficient Load Balancing (ELB). …”
Get full text
Get full text
Get full text
Thesis -
4
Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems
Published 2016“…These problems motivated to propose Max Degres Around (MDA) approximation algorithm for the MVC problem. …”
Get full text
Get full text
Get full text
Article -
5
Fair uplink bandwidth allocation and latency guarantee for mobile WiMAX using fuzzy adaptive deficit round robin
Published 2014“…In this paper, an efficient bandwidth allocation algorithm for the uplink traffic in mobile WiMAX is proposed. …”
Get full text
Get full text
Get full text
Article -
6
The application of neural networks and min-max algorithm in digital congkak
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Quality of service management algorithms in WiMAX networks
Published 2015“…Thirdly, an energy algorithm called the Efficient Battery Life-aware Power Saving (EBLAPS) algorithm is proposed to address the problems of minimizing energy at the expense of response due to how energy sleep parameters are adjusted based on the residual energy and the use of standard sleep mode algorithms consumes high energy because of frequent transition to listening mode in the case of light traffic. …”
Get full text
Get full text
Thesis -
8
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…However, mobility in WiMAX system is still an issue when a mobile station (MS) moves and its connection is handed over between base stations (BSs). …”
Get full text
Get full text
Thesis -
9
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
10
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Cryptography is the science of hiding information and its applications include ATM cards, computer passwords and electronic commerce in this modern world. …”
Get full text
Get full text
Research Reports -
11
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
12
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
13
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
Get full text
Get full text
Get full text
Article -
14
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
15
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
16
-
17
-
18
-
19
Automatic algorithm applied for calculating thermal conductivity by transient plane source method
Published 2024“…To address this issue, an automatic algorithm based on the international standard (ISO22007-2:2008) is proposed in this paper. …”
Get full text
Get full text
Get full text
Article -
20
WiMAX Traffic Forecasting Based On Artificial Intelligence Techniques
Published 2024thesis::doctoral thesis
