Search Results - (( java implementation rsa algorithm ) OR ( using computer data algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- data algorithm »
- rsa algorithm »
- computer data »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Data discovery algorithm for scientific data grid environment
Published 2005“…By using this model, we study various discovery algorithms for locating data sets in a data grid system. …”
Get full text
Get full text
Get full text
Article -
7
Two objectives big data task scheduling using swarm intelligence in cloud computing
Published 2016“…On the other hand, scheduling algorithms; starting from traditional to Hyper-heuristic; are widely used in computing systems such as cloud computing to monitor the use of resources. …”
Get full text
Get full text
Get full text
Article -
8
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…To avoid such overheads many techniques have been used, however in this thesis stream-based data processing model is used in which data is processed in the form of continuous instances of data items. …”
Get full text
Get full text
Get full text
Thesis -
9
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
Published 2019“…This work highlights that big data analytics using computational intelligent algorithms generates a very high amount of energy, especially during the training phase. …”
Get full text
Get full text
Article -
10
LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data
Published 2019“…To address this issue, we propose an efficient algorithm to measure the similarity indexes of multivariate data sets using a non-metric-based methodology. …”
Get full text
Get full text
Article -
11
-
12
Image Encrytion Using Block Based Transformation Algorithm
Published 2008Get full text
Get full text
Get full text
Article -
13
-
14
Development of heuristic task scheduling algorithm in cloud computing
Published 2016“…Index Terms— Big Data Analytics, Cloud Computing, Heuristic, Scheduling, Static.…”
Get full text
Get full text
Proceeding Paper -
15
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018Get full text
Get full text
Get full text
Undergraduates Project Papers -
16
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…Lately, a fully online buffer-based clustering algorithm for handling evolving data streams (BOCEDS) was developed. …”
Article -
17
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
Get full text
Get full text
Thesis -
18
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
A theoretical framework for big data analytics based on computational intelligent algorithms with the potential to reduce energy consumption
Published 2019“…This work highlights that big data analytics using computational intelligent algorithms generates a very high amount of energy, especially during the training phase. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter
