Search Results - (( process communication technique algorithm ) OR ( java application using algorithm ))
Search alternatives:
- communication technique »
- process communication »
- java application »
- using algorithm »
-
1
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…Nowadays the internet communication playing the imperative role that used to transfer large amount of cloud data in various fields and website applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Secure E-Voting With Blind Signature
Published 2003“…E-Voting system employs cryptographic techniques to overcome the security issues in the election process. …”
Get full text
Get full text
Conference or Workshop Item -
3
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
4
-
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
Bio-inspired fault tolerant network on chip
Published 2017“…The integration of heterogeneous processing elements (PEs) or nodes in the System on Chip (SoC) has made the communication structure very complex. …”
Get full text
Get full text
Article -
7
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
9
Thresholding and quantization algorithms for image compression techniques : a review
Published 2018“…This paper presents a review of image compression principle, compression techniques and various thresholding algorithms (pre-processing algorithms) and quantization algorithm (post-processing algorithms). …”
Get full text
Get full text
Get full text
Article -
10
Thresholding and quantization algorithms for image compression techniques: a review
Published 2018“…This paper presents a review of image compression principle, compression techniques and various thresholding algorithms (pre-processing algorithms) and quantization algorithm (post-processing algorithms). …”
Get full text
Get full text
Article -
11
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…Performance of the QPSO technique based on many heuristic algorithms it is comprised the following steps. …”
Get full text
Thesis -
12
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…Secure Communication most often uses cryptographic primitives as the methods or techniques to protect the confidentiality of data being communicated. …”
Get full text
Get full text
Thesis -
14
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
15
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
16
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…Furthermore, some analyses on hiding quality show that our algorithm retains the cover image quality as high as that of standard LSB algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Implementation and Analysis of Biological Synaptogenesis Technique on Nodes and Interconnects for NoC Fault Tolerance
Published 2016“…The excessive and parallel communication requirements of heterogeneous processing elements (PE’s) in NoC have made the communication structure very complex. …”
Get full text
Get full text
Article -
18
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Lightweight authentication technique for secure communication of edge/fog data-centers
Published 2020“…Additionally, the key sharing phase of their algorithm is complex. Therefore, to address the highlighted challenges, this paper proposed a lightweight key escrow-less authentication algorithm that will ensure secure communication of resource-constrained edge data-centres during the load balancing process. …”
Get full text
Get full text
Article -
20
Synaptogenesis based bio-inspired NoC fault tolerant interconnects
Published 2013“…Network on Chip (NoC) is a communication framework for interconnection of processing element (PE's). …”
Get full text
Get full text
Conference or Workshop Item
