Search Results - (( generating application scheduling algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- generating application »
- application scheduling »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Scalable workflow scheduling algorithm for minimizing makespan and failure probability
Published 2019“…A workflow generator was developed to generate large task graphs randomly and scheduled the parallel applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network
Published 2015“…The novel algorithm has proven to be an effective scheduling technique for smart grid applications.…”
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
-
10
-
11
Benchmark simulator with dynamic environment for job scheduling in grid computing
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Energy-driven scheduling for Digital Video Broadcasting - Satellite Second Generation (DVB-S2)
Published 2013Get full text
Get full text
Conference or Workshop Item -
13
-
14
A study of an efficient scheduling algorithm for simultaneous 5G multimedia Traffic
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
16
Performance comparison of downlink packet scheduling algorithms in LTE network
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Efficiency and accuracy of scheduling algorithms for final year project evaluation management system
Published 2023“…Scheduling algorithms play a crucial role in optimizing the efficiency and precision of scheduling tasks, finding applications across various domains to enhance work productivity, reduce costs, and save time. …”
Get full text
Get full text
Get full text
Article -
18
An improved genetic algorithm for solving the multiprocessor scheduling problem
Published 2011“…The applications of this problem are numerous, but are, as suggested by the name of the problem, most strongly associated with the scheduling of computational tasks in a multiprocessor environment. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Delay-Prioritized Scheduling (DPS) for Real Time Traffic in 3GPP LTE System
Published 2010“…This has imposed new challenges in the design of packet scheduling algorithms in these systems. To address those challenges, a new packet scheduling algorithm for real time (RT) traffic in downlink third generation partnership project long term evolution (3GPP LTE) system is proposed in this paper. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project
