Search Results - (( java application optimization algorithm ) OR ( using com encryption algorithm ))
Search alternatives:
- application optimization »
- java application »
- using com »
-
1
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
2
-
3
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
4
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
5
-
6
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
7
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
-
10
A hybrid method for data communication using encrypted audio steganography
Published 2024journal::journal article -
11
Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data
Published 2023Conference Paper -
12
-
13
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
14
-
15
-
16
-
17
A performance improvement of Domosi’s cryptosystem
Published 2015Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
-
20
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article
