Search Results - (( developing mode efficient algorithm ) OR ( java evaluation using algorithm ))
Search alternatives:
- evaluation using »
- developing mode »
- java evaluation »
- using algorithm »
- mode efficient »
-
1
A parallel XTS encryption mode of operation
Published 2009“…Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Conference or Workshop Item -
2
Implementation of a parallel XTS encryption mode of operation
Published 2014“…Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Get full text
Article -
3
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
4
A performance analysis of association rule mining algorithms
Published 2016“…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
Get full text
Get full text
Conference or Workshop Item -
5
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…These limitations in XTS have been successfully overcome by the enhanced parallel XTS mode of operation which gives a 1.80 speedup factor with 90 percent efficiency using AES as an encryption algorithm. …”
Get full text
Get full text
Thesis -
6
Quality of service management algorithms in WiMAX networks
Published 2015“…Moreover, an improved sleep mode control algorithm has been introduced to reduce the high energy consumption of the standard sleep mode algorithm. …”
Get full text
Get full text
Thesis -
7
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
8
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The present study proposes an efficient DDoS attack detection model. This model relies mainly on dimensionality reduction and machine learning algorithms. …”
Get full text
Get full text
Get full text
Article -
9
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The present study proposes an efficient DDoS attack detection model. This model relies mainly on dimensionality reduction and machine learning algorithms. …”
Get full text
Get full text
Get full text
Article -
10
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The present study proposes an efficient DDoS attack detection model. This model relies mainly on dimensionality reduction and machine learning algorithms. …”
Get full text
Get full text
Get full text
Article -
11
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The present study proposes an efficient DDoS attack detection model. This model relies mainly on dimensionality reduction and machine learning algorithms. …”
Get full text
Get full text
Get full text
Article -
12
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…The present study proposes an efficient DDoS attack detection model. This model relies mainly on dimensionality reduction and machine learning algorithms. …”
Get full text
Get full text
Get full text
Article -
13
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
14
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
15
New algorithm for gyroless spacecraft angular rate Estimation and its application
Published 2006“…A new algorithm for estimating the angular velocity using quaternion measurements is developed based on the concept of the global optimality resulting when using a centralized or master Kalman filter. …”
Get full text
Get full text
Article -
16
QR factorization equalisation scheme for mode devision multiplexing transmission in fibre optics
Published 2016“…This is done by trying to avoid the issues accompanied with the development of the previous algorithms that have been utilized for the same goal. …”
Get full text
Get full text
Get full text
Thesis -
17
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…The aim is to improve the utilization of computing resources and reduce energy consumption under SLA constraints regarding CPU, RAM, and bandwidth. The efficiency of the proposed algorithms is validated by conducting extensive simulations. …”
Get full text
Get full text
Get full text
Article -
18
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
19
Modelling and optimization of a transit services with feeder bus and rail system / Mohammadhadi Almasi
Published 2015“…In this study, optimized transit services and coordinated schedules are developed using metaheuristic algorithms such as genetic algorithm (GA), particle swarm optimization (PSO), water cycle algorithm (WCA) and imperialist competitive algorithm (ICA). …”
Get full text
Get full text
Thesis -
20
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
Get full text
Get full text
Get full text
Thesis
