Search Results - (( java implementation rsa algorithm ) OR ( based computer usage algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- based computer »
- computer usage »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…Therefore, a simple and practical computational method that is more accurate, faster, easy to configure and use, and bears low computing cost is needed particularly for offline usage. …”
Get full text
Get full text
Monograph -
7
-
8
A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization
Published 2019“…This thesis aims at providing solutions to the problem by introducing an authorization framework, namely the Federated Grid Usage Control (FGUC) with a new ontology-based policy model, namely, the UCON based Access Control Ontology (UBACO), and a new grid authorization algorithm, namely, the Elimination of the Irrelevant Authorization Rules Set (EIARS). …”
Get full text
Get full text
Thesis -
9
Parallel distributed computational microcontroller system for adaptive antenna downlink transmitter power optimization
Published 2023“…Parallel Distributed Genetic Algorithm (PDGA) is employed in adaptive beam forming technique to reduce power usage of adaptive antenna at WCDMA base station. …”
Article -
10
Cloud computing load balancing technique with virtual machine migration / Rabiatul Addawiyah Mat Razali
Published 2017“…The demand for cloud computing usage is speedily increasing day by day due to the facilities and advantages it offers. …”
Get full text
Get full text
Thesis -
11
Relationship based replication algorithm for data grid
Published 2014“…The Relationship based Replication algorithm aims to improve the Data Grid performance by reducing the job execution time, bandwidth and storage usage.The RBR was realized using a network simulation (OptorSim) and experiment results revealed that it offers better performance than existing replication algorithms.…”
Get full text
Get full text
Monograph -
12
Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
13
-
14
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…The results also show low memory usage and computing power in comparison with the baseline algorithms. � 2023 THE AUTHORS…”
Article -
15
Web usage mining for UUM learning care using association rules
Published 2004Get full text
Get full text
Thesis -
16
-
17
Deadline guarantee for scientific workflow using dynamic scheduling algorithms on IaaS clouds
Published 2018“…The flexibility inherent in the elastic Cloud model, while powerful computing results in inefficient usage and high costs when inadequate scheduling and provisioning decisions are made. …”
Get full text
Get full text
Thesis -
18
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
19
An efficient VM scheduling algorithm to minimize the makespan and maximize the profit
Published 2019“…The second process is hyper analytical task scheduling algorithm, and based on the scheduled task, the policy based profit maximization algorithm was proposed in final process. …”
Get full text
Get full text
Thesis -
20
Using the evolutionary mating algorithm for optimizing the user comfort and energy consumption in smart building
Published 2023“…To address the optimization problem, the Evolutionary Mating Algorithm (EMA) is proposed. EMA belongs to the evolutionary computation group of nature-inspired metaheuristic algorithms and offers a promising solution. …”
Get full text
Get full text
Get full text
Get full text
Article
