Search Results - (( filing implementation level algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- filing implementation »
- implementation level »
- implication based »
- java implication »
- level algorithm »
-
1
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Both old and new implementations are used to encrypt and decrypt different sizes and types of files using different generated key sizes. …”
Get full text
Get full text
Thesis -
3
-
4
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
5
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
6
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The research involved three phases, algorithm design, implementation, and evaluation. …”
Get full text
Get full text
Get full text
Thesis -
7
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. Experimental results indicate that as the thread level increases, the encryption and decryption time, which is the most time consuming operation, decreases which shows an improved speed of the RSA cryptosystem.The proposed implementation has a great potential to effectively deal with the RSA algorithm slow speed.…”
Get full text
Get full text
Get full text
Article -
8
Adaptive noise cancellation by LMS algorithm
Published 2004“…In this research, the least mean square (LMS) algorithm using MATLAB was implemented. Step size determination was done to determine the best step size and effects of the rate of convergence. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
-
10
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
Published 2014“…The combination of a DPT with a dynamic 3D S-box strengthens the resistance of the NBA against attacks and increases the randomness of the output.C++ is used in the implementation of both algorithms.The NIST tests are implemented under Linux.…”
Get full text
Get full text
Get full text
Article -
11
Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran
Published 2021“…The algorithm reads inputs of the ADS-B data file, stores all the required fields for processing either all or a single flight, and finally the ASE will be calculated. …”
Get full text
Get full text
Get full text
Thesis -
12
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
Published 2024“…Therefore, this study proposes the addition in toolkits implementation, the latest software tools version and the latest solution, an improvement proof-of-concept utilizes SHA-256 hashing algorithm to improve the collection of evidence and enhance integrity. …”
Get full text
Get full text
Get full text
Article -
13
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Finally, a comparison of the newly proposed algorithm and previous algorithms will be evaluated in a table.…”
Get full text
Get full text
Get full text
Article -
14
Design of a reconfigurable computing platform
Published 2023“…The PSP also automates the synthesis and implementation process integration to generate the bitstream file from the Xilinx ISE foundation tool. …”
Conference paper -
15
-
16
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Design of a floating point unit for 32-bit 5 stage pipeline processor
Published 2020“…The development project will start by studying the algorithm of addition on floating point numbers. The addition algorithm is then implemented in the FPU so that the FPU can perform addition on floating point numbers. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Web usage mining for UUM learning care using association rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Thesis -
20
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis
