Search Results - (( network security parallel algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Enhanced Storage Mechanism for Secured Parallel Network File System by K J, Latesh Kumar

    Published 2018
    “…The problem statement relies how the enhancement of storage mechanism for secured parallel network file system will benefit the storage computing environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Reducing the calculation time of the algorithm, in sequential and parallel platforms, using the doubling-rule technique combined with a new scheme led to a strong improvement of the LUC algorithm speed. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…On the other hand, existing stream data learning models with limited labelling have many limitations. Most importantly, algorithms that suffer from a limited capability to adapt to the evolving nature of data generated from network traffic are called concept drift. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…RSA cipher is of the asymmetric encryption technique that is widely used today over the internet and a large network environment. The RSA algorithm can be used for both public key encryption and digital signatures. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol by Al-Alak, Saif M. Kh.

    Published 2014
    “…The improvement of the security system of the WSN makes it more trustworthy.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Optimal placement of static VAR compensator using genetic algorithms by Mustafa, Mohd. Wazir, Wong, Yan Chiew

    Published 2008
    “…The management of power systems has become more difficult than earlier because power systems are operated closer to security limits, environmental constraints restrict the expansion of transmission network and the need for long distance power transfers has increased. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    Managing Fragmented Database Replication for Mygrants Using Binary Vote Assignment on Cloud Quorum by Noraziah, Ahmad, Ainul Azila, Che Fauzi, Wan Maseri, Wan Mohd, Mohd Azhar, Mohd Amer, Herawan, Tutut

    Published 2014
    “…Fragmentation in distributed database is very useful in terms of usage, efficiency, parallelism and also for security. This strategy will partition the database into disjoint fragments. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA by Ahmed, Shakil

    Published 2013
    “…In recent years security has been a common concern for the data in-transit between communication networks as well as data at-rest in storage devices. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. Modification and simplification using parallel processing are done for both methods to grossly search the optimal solution and to minimize the program running time, respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Implementation of a Symmetric Chaotic Encryption Scheme by Sivanandan, Easwari

    Published 2004
    “…Voice privacy and security needs to focused upon and data encryption techniques are the answers in providing the security needed. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    On line fault detection for transmission line using power system stabilizer signals by Ali Falifla, Hamza AbuBeker

    Published 2007
    “…Hence, this study will show that not only the PSS able to compensate the damping due to the disturbance but also by using the developed algorithm it succeeds to detect and classify the fault conditions on the parallel transmission lines.…”
    Get full text
    Get full text
    Thesis
  19. 19

    OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA by DORE RAJA, ANAND A RAJA

    Published 2004
    “…Twofish is a 16 round Feistel network with a bijective F function, which corresponds to 8 cycles. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Optimization Of Twofish Encryption Algorithm On FPGA by Raja, Ananda Raja Dore, Zain Ali, Noohul Basheer, Hussin, Fawnizu Azmadi

    Published 2005
    “…Twofish is a 16 round Feistel network with a bijective F function, which corresponds to 8 cycles. …”
    Get full text
    Conference or Workshop Item