Search Results - (( network security parallel algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- security parallel »
- implication based »
- java implication »
-
1
Enhanced Storage Mechanism for Secured Parallel Network File System
Published 2018“…The problem statement relies how the enhancement of storage mechanism for secured parallel network file system will benefit the storage computing environment. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
Published 2015“…This study examines the security and performance issues surrounding the CGA generation algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Reducing the calculation time of the algorithm, in sequential and parallel platforms, using the doubling-rule technique combined with a new scheme led to a strong improvement of the LUC algorithm speed. …”
Get full text
Get full text
Thesis -
4
-
5
Algorithm Design of Digital Watermarking Scheme for Multi-frames Medical Images
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…On the other hand, existing stream data learning models with limited labelling have many limitations. Most importantly, algorithms that suffer from a limited capability to adapt to the evolving nature of data generated from network traffic are called concept drift. …”
Get full text
Get full text
Thesis -
7
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…RSA cipher is of the asymmetric encryption technique that is widely used today over the internet and a large network environment. The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
8
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
Published 2014“…The improvement of the security system of the WSN makes it more trustworthy.…”
Get full text
Get full text
Thesis -
9
Optimal placement of static VAR compensator using genetic algorithms
Published 2008“…The management of power systems has become more difficult than earlier because power systems are operated closer to security limits, environmental constraints restrict the expansion of transmission network and the need for long distance power transfers has increased. …”
Get full text
Get full text
Get full text
Article -
10
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026thesis::doctoral thesis -
11
A review on security and privacy issues in E-learning and the MapReduce aproach
Published 2019“…Therefore, the actions against security incidents increased since network-connected devices. …”
Get full text
Get full text
Get full text
Article -
12
Solving the optimal reactive power dispatch problem based on moth-flame optimizer for power system operation and planning
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Managing Fragmented Database Replication for Mygrants Using Binary Vote Assignment on Cloud Quorum
Published 2014“…Fragmentation in distributed database is very useful in terms of usage, efficiency, parallelism and also for security. This strategy will partition the database into disjoint fragments. …”
Get full text
Get full text
Get full text
Article -
14
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…In recent years security has been a common concern for the data in-transit between communication networks as well as data at-rest in storage devices. …”
Get full text
Get full text
Thesis -
15
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. Modification and simplification using parallel processing are done for both methods to grossly search the optimal solution and to minimize the program running time, respectively. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…Voice privacy and security needs to focused upon and data encryption techniques are the answers in providing the security needed. …”
Get full text
Get full text
Final Year Project -
18
On line fault detection for transmission line using power system stabilizer signals
Published 2007“…Hence, this study will show that not only the PSS able to compensate the damping due to the disturbance but also by using the developed algorithm it succeeds to detect and classify the fault conditions on the parallel transmission lines.…”
Get full text
Get full text
Thesis -
19
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…Twofish is a 16 round Feistel network with a bijective F function, which corresponds to 8 cycles. …”
Get full text
Get full text
Final Year Project -
20
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…Twofish is a 16 round Feistel network with a bijective F function, which corresponds to 8 cycles. …”
Get full text
Conference or Workshop Item
