Search Results - (( data quality encryption algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- quality encryption »
- java simulation »
- data quality »
-
1
Cryptography: A New Approach of Classical Hill Cipher
Published 2013“…Apart from this, the encryption quality of the proposed algorithm is also measured by using the maximum deviation and correlation coefficient factors. …”
Get full text
Get full text
Article -
2
Image steganography for encryption over network security
Published 2017“…Cryptography was commonly used for encryption so that the data cannot be understand by others but this technique was exposed to decryption because anyone would have known that this data contain secret message. …”
Get full text
Get full text
Student Project -
3
An overview of video encryption techniques
Published 2010“…A trade-off between quality of video streaming and choice of encryption algorithm were shown. …”
Get full text
Get full text
Get full text
Article -
4
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
Published 2018“…For data security, block ciphers like advanced encryption standard are needed. …”
Get full text
Get full text
Get full text
Article -
5
A chaotic neural network based encryption algorithm for MPEG-2 encoded video signal
Published 2012Get full text
Working Paper -
6
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Chaos-based simultaneous compression and encryption for Hadoop
Published 2017“…Data compression and encryption are key components of commonly deployed platforms such as Hadoop. …”
Get full text
Get full text
Article -
10
A novel enhancement technique of the hill cipher for effective cryptographic purposes.
Published 2011“…Results: A comparative study has been made between the proposed algorithm and the existing algorithms. The encryption quality of the proposed algorithm is also measured by using the maximum deviation factor and correlation coefficient factor. …”
Get full text
Get full text
Get full text
Article -
11
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
12
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
13
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…First is study the feasibility of the chaotic encryption scheme in providing a solution in to preserve data security while maintaining the voice quality for voice over Internet Protocol. …”
Get full text
Get full text
Final Year Project -
14
-
15
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
16
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
17
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
18
Anti-forensic steganography method based on randomization
Published 2013“…First, the secret information are encrypted using Rijndael Encryption Algorithm. Then, the cover image is divided into several matrices. …”
Get full text
Get full text
Get full text
Article -
19
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
20
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
Get full text
Get full text
Conference or Workshop Item
