Search Results - (( development programs encryption algorithm ) OR ( java application scheduling algorithm ))
Search alternatives:
- application scheduling »
- development programs »
- java application »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…The CPU profiler of JavaTM VisualVM measures the number of invocations of scheduling event handlers (procedures) in each algorithm as well as the total time spent in all invocations of this handler. …”
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
4
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
5
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
6
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
7
Improving Class Timetabling using Genetic Algorithm
Published 2006“…This paper reports the power fill techniques using GA in scheduling. Class timetabling problem is one of the applications in scheduling. …”
Get full text
Get full text
Get full text
Thesis -
8
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005“…This paper reports the powerful techniques using GA in scheduling. Examination timetabling problem is one of the applications in scheduling. …”
Get full text
Get full text
Thesis -
9
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
10
Examination Timetabling Using Genetic Algorithm Case Study : KUiTTHO
Published 2005“…This paper reports the powerful techniques using GA in scheduling. Examination timetabling problem is one of the applications in scheduling. …”
Get full text
Get full text
Get full text
Thesis -
11
Encryption Technology on Windows Workstation
Published 2004“…The purpose of this study is to develop a new type of encryption methodbased on RSAtechnique. …”
Get full text
Get full text
Final Year Project -
12
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
13
-
14
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
15
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…Many algorithms have been implemented to solve the grid scheduling problem. …”
Get full text
Get full text
Get full text
Thesis -
16
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
17
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
18
Analysis of image steganography using AES / Nur Amira Muhamad Ghazali
Published 2020“…In this project, we combine the method of cryptography and steganography using Advanced Encryption Standard (AES) and Least Significant Bits (LSB) algorithms. …”
Get full text
Get full text
Thesis -
19
Provider independent cryptographic tools
Published 2003“…The library consists of cryptographic algorithms that include symmetric and asymmetric encryptions, key exchange, hashing algorithms and digital signature algorithms. …”
Get full text
Get full text
Get full text
Monograph -
20
