Search Results - (( based optimization ((max algorithm) OR (_ algorithm)) ) OR ( java application rsa algorithm ))
Search alternatives:
- java application »
- application rsa »
- max algorithm »
- rsa algorithm »
-
1
-
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
-
4
A particle swarm optimization and min-max-based workflow scheduling algorithm with QoS satisfaction for service-oriented grids
Published 2017“…The algorithm selects the best scheduling solutions based on the proposed constraint-handling strategy. …”
Get full text
Get full text
Article -
5
-
6
Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems
Published 2016“…Hence, these approaches regularly fail to provide optimal results on specific graph instances. These problems motivated to propose Max Degres Around (MDA) approximation algorithm for the MVC problem. …”
Get full text
Get full text
Get full text
Article -
7
A comparative evaluation of heuristic and metaheuristic job scheduling algorithms for optimized resource management in cloud environments
Published 2026“…This study provides a comprehensive analysis and comparison of six prevalent scheduling algorithms, namely FCFS, SJF, LJF, EDF, Max-Min, and PSO, under varying cloudlet loads of 200,400,600,800, and 1000. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Fair bandwidth assignment in hierarchical scheduling for mobile WiMAX system
Published 2011“…In this paper, we propose a fair bandwidth assignment algorithm that allocates the bandwidth among different services classes based on a hierarchical scheduler. …”
Get full text
Get full text
Conference or Workshop Item -
9
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…It reduces the number of handovers by 29.7% and 26.9%, respectively, compared to the conventional RSSI based handover algorithm and the previous worked, mobility improved handover (MIHO) algorithm. …”
Get full text
Get full text
Thesis -
10
Fair uplink bandwidth allocation and latency guarantee for mobile WiMAX using fuzzy adaptive deficit round robin
Published 2014“…In this paper, an efficient bandwidth allocation algorithm for the uplink traffic in mobile WiMAX is proposed. …”
Get full text
Get full text
Get full text
Article -
11
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Cross-layer design using multi-channel system in WiMAX mesh networks
Published 2008“…The WiMAX mesh networks based on IEEE 802.16 standard is a key topology for the next generation wireless networking. …”
Get full text
Get full text
Conference or Workshop Item -
13
Improvement of Centralized Routing and Scheduling Using Cross-Layer Design and Multi-Slot Assignment in Wimax Mesh Networks
Published 2009“…This thesis proposes an optimized strategy namely cross-layer design in routing algorithms used find the best route for all SSs and scheduling algorithms, used to assign a time slot for each possible node transmission. …”
Get full text
Get full text
Thesis -
14
Adaptive resource allocation algorithms with QoS support in OFDMA-based WiMAX networks
Published 2014“…This thesis presents four main contributions for QoS provisioning which are robust, scalable, and can be successfully executed in WiMAX system. The first and second contributions are two slot resource allocation algorithms for OFDMA downlink (DL) scheduling, namely Weighted-rate Adaptive Slot Allocation (WASA) and Feedback Delay-based Slot Allocation (FDSA). …”
Get full text
Get full text
Thesis -
15
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
16
Ant colony optimization in dynamic environments
Published 2010“…Apart from the size of the optimization problem, how the swapping interval affects the dynamic optimization by the ant algorithms is also investigated. …”
Get full text
Get full text
Get full text
Thesis -
17
Energy-efficient base station transmission design for green 5G massive MIMO and hybrid networks
Published 2021“…Then, a new corresponding iterative EE optimization algorithm is proposed based on the BSTPA model to further improve the system’s EE. …”
Get full text
Get full text
Thesis -
18
Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm
Published 2018“…The suggested approaches are called new approach to min-max (NAMM) and decimal scaling (NADS). The Hybrid mean algorithms which are based on spherical clusters is also proposed to remedy the most significant limitation of the K-Means and K-Midranges algorithms. …”
Get full text
Get full text
Get full text
Thesis -
19
Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review
Published 2025“…The primary objective of this paper isto review localization algorithms based on metaheuristic optimization techniques to improve localization accuracy. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Reactive approach for automating exploration and exploitation in ant colony optimization
Published 2016“…Ant colony optimization (ACO) algorithms can be used to solve nondeterministic polynomial hard problems. …”
Get full text
Get full text
Get full text
Thesis
