Search Results - (( developing problem encryption algorithm ) OR ( java application scheduling algorithm ))
Search alternatives:
- application scheduling »
- developing problem »
- problem encryption »
- java application »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…The CPU profiler of JavaTM VisualVM measures the number of invocations of scheduling event handlers (procedures) in each algorithm as well as the total time spent in all invocations of this handler. …”
Get full text
Get full text
Conference or Workshop Item -
2
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…In addition, the hyperparameter tuning problem is considered in this research to improve the developed hybrid model by using the AOA algorithm. …”
Get full text
Get full text
Thesis -
3
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…However, AES users or application that using AES algorithm might face the problem of computational overhead. …”
Get full text
Get full text
Thesis -
4
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
5
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
6
An overview of video encryption techniques
Published 2010“…Over the last few years several encryption algorithms have applied to secure video transmission. …”
Get full text
Get full text
Get full text
Article -
7
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
8
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
9
Lightweight encryption technique to enhance medical image security on internet of medical things applications
Published 2021“…However, the study has found that the existing proposed techniques still face application-specific several security problems. Therefore, this paper presents an efficient, lightweight encryption algorithm to develop a secure image encryption technique for the healthcare industry. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Improving Class Timetabling using Genetic Algorithm
Published 2006“…This paper reports the power fill techniques using GA in scheduling. Class timetabling problem is one of the applications in scheduling. …”
Get full text
Get full text
Get full text
Thesis -
11
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005“…This paper reports the powerful techniques using GA in scheduling. Examination timetabling problem is one of the applications in scheduling. …”
Get full text
Get full text
Thesis -
12
Examination Timetabling Using Genetic Algorithm Case Study : KUiTTHO
Published 2005“…This paper reports the powerful techniques using GA in scheduling. Examination timetabling problem is one of the applications in scheduling. …”
Get full text
Get full text
Get full text
Thesis -
13
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…This study demonstrates contributions by applying these ideas to two classical problems on the natural algorithm calculation and signal processing.…”
Get full text
Get full text
Conference or Workshop Item -
14
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. …”
Get full text
Get full text
Final Year Project -
15
An analysis of lowest energy consumption (CPU time) through running several cryptography algorithms with different video formats
Published 2023“…It may similarly be described as the science that utilizes mathematics in decryption and encryption data processes. In this article, we consider different significant algorithms utilized for data decryption and encryption in whole areas, for making a comparative study for most vital algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
17
A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations
Published 2009“…Doing arithmetic in finite field is the key part to the implementation of communication and coding system including the newly developed Rijndael the Advanced Encryption Standard (AES). …”
Get full text
Get full text
Article -
18
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…In this paper, we have proposed a new encryption and decryption system to solve the lack of data hiding problem. …”
Get full text
Get full text
Student Project -
19
-
20
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
Published 2004“…Doing arithmetic in finite field is the key part to the implementation of communication and coding system including the newly developed Rijndael the Advanced Encryption Standard (AES). …”
Get full text
Get full text
Thesis
