Search Results - (( java application rsa algorithm ) OR ( data virtualization _ algorithm ))
Search alternatives:
- data virtualization »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…In this paper, several novel algorithms are proposed for the dynamic consolidation of VMs in cloud data centers. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Impatient job scheduling under cloud computing
Published 2012“…The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
Get full text
Get full text
Thesis -
9
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…The proposed HBAC algorithm was tested and compared with other stateof-the-art algorithms on 200 to 2000 even tasks by using CloudSim on standard workload format (SWF) data sets file size (200kb and 400kb). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Performance analysis of constrained device virtualization algorithm
Published 2020“…This paper proposes the operations of the Constrained Device Virtualization Algorithm and then simulates it in CloudSIM to derive performance results. …”
Get full text
Get full text
Get full text
Article -
11
Enhancing hyperparameters of LSTM network models through genetic algorithm for virtual learning environment prediction
Published 2025“…Genetic algorithms for hyperparameter optimization significantly contributed, with the GA + LSTM + ADAGRAD model achieving 88% and 87% accuracy in the 7th and 9th models for BBB course data. …”
Get full text
Get full text
Get full text
Article -
12
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…The efficiency was analysed in terms of time delay in data transfer between two mediums during the monitoring process, which were the actual and the virtual conveyor process. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The reliability of VR supports various variations in learning, including learning programming algorithms. This research aims to design and develop VR in learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
16
Finger triggered virtual musical instruments
Published 2012“…The musical notes recognition system matches the received triggering signal data with the predefined musical notes data using matching algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
17
Finger triggered virtual musical instruments
Published 2013“…The musical notes recognition system matches the received triggering signal data with the predefined musical notes data using matching algorithm. …”
Get full text
Get full text
Get full text
Article -
18
A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods
Published 2014“…The Feedback is to produce response from the user regarding the motion data and the position of gestures. Gesture Recognition is to recognise the gestures and performs the basic transformation of the virtual heart. …”
Get full text
Get full text
Academic Exercise -
19
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Research Reports -
20
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…As for this study, virtual area based is been used which applied to bathymetry data set that has been collected by using R2 Sonic 2020. …”
Get full text
Get full text
Thesis
