Search Results - (( based optimization ((max algorithm) OR (_ algorithm)) ) OR ( java application rsa algorithm ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4
  5. 5
  6. 6

    Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems by Fayaz, Muhammad, Arshad, S, Shah, A.S, Shah, Asadullah

    Published 2016
    “…Hence, these approaches regularly fail to provide optimal results on specific graph instances. These problems motivated to propose Max Degres Around (MDA) approximation algorithm for the MVC problem. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A comparative evaluation of heuristic and metaheuristic job scheduling algorithms for optimized resource management in cloud environments by Haque, Najmul, Zafril Rizal, M. Azmi, Murad, Saydul Akbar

    Published 2026
    “…This study provides a comprehensive analysis and comparison of six prevalent scheduling algorithms, namely FCFS, SJF, LJF, EDF, Max-Min, and PSO, under varying cloudlet loads of 200,400,600,800, and 1000. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Fair bandwidth assignment in hierarchical scheduling for mobile WiMAX system by Alsahag, Ali Mohammed Mansoor, Mohd Ali, Borhanuddin, Noordin, Nor Kamariah, Mohamad, Hafizal

    Published 2011
    “…In this paper, we propose a fair bandwidth assignment algorithm that allocates the bandwidth among different services classes based on a hierarchical scheduler. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks by Mubarak, Mohammed Awadh Ahmed Ben

    Published 2013
    “…It reduces the number of handovers by 29.7% and 26.9%, respectively, compared to the conventional RSSI based handover algorithm and the previous worked, mobility improved handover (MIHO) algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Cross-layer design using multi-channel system in WiMAX mesh networks by Al-Hemyari, Ali, Ng, Chee Kyun, Noordin, Nor Kamariah, Ismail, Alyani, Khatun, Sabira, Jamuar, Sudhanshu Shekhar

    Published 2008
    “…The WiMAX mesh networks based on IEEE 802.16 standard is a key topology for the next generation wireless networking. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Improvement of Centralized Routing and Scheduling Using Cross-Layer Design and Multi-Slot Assignment in Wimax Mesh Networks by Al-Humairi, Ali Zuhair Abdulameer

    Published 2009
    “…This thesis proposes an optimized strategy namely cross-layer design in routing algorithms used find the best route for all SSs and scheduling algorithms, used to assign a time slot for each possible node transmission. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Adaptive resource allocation algorithms with QoS support in OFDMA-based WiMAX networks by Alsahag, Ali Mohamemed Mansor

    Published 2014
    “…This thesis presents four main contributions for QoS provisioning which are robust, scalable, and can be successfully executed in WiMAX system. The first and second contributions are two slot resource allocation algorithms for OFDMA downlink (DL) scheduling, namely Weighted-rate Adaptive Slot Allocation (WASA) and Feedback Delay-based Slot Allocation (FDSA). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Ant colony optimization in dynamic environments by Chen, Fei Huang

    Published 2010
    “…Apart from the size of the optimization problem, how the swapping interval affects the dynamic optimization by the ant algorithms is also investigated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Energy-efficient base station transmission design for green 5G massive MIMO and hybrid networks by Khodamoradi, Vahid

    Published 2021
    “…Then, a new corresponding iterative EE optimization algorithm is proposed based on the BSTPA model to further improve the system’s EE. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm by Dalatu, Paul Inuwa

    Published 2018
    “…The suggested approaches are called new approach to min-max (NAMM) and decimal scaling (NADS). The Hybrid mean algorithms which are based on spherical clusters is also proposed to remedy the most significant limitation of the K-Means and K-Midranges algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2025
    “…The primary objective of this paper isto review localization algorithms based on metaheuristic optimization techniques to improve localization accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Reactive approach for automating exploration and exploitation in ant colony optimization by Allwawi, Rafid Sagban Abbood

    Published 2016
    “…Ant colony optimization (ACO) algorithms can be used to solve nondeterministic polynomial hard problems. …”
    Get full text
    Get full text
    Get full text
    Thesis