Search Results - (( process information security algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- process information »
- java application »
-
1
Smart student timetable planner
Published 2025“…To achieve these objectives, the system adopts the Rapid Application Development (RAD) methodology, ensuring iterative design, prototyping, and user feedback integration throughout the process. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
3
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
4
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
5
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
-
7
-
8
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
9
A block cipher based on genetic algorithm
Published 2016“…Therefore, this new proposed block cipher can be used by countries, organizations, stakeholders or interested parties as one of the secure algorithm to increase the protection of the information and also will contribute as an alternative to other cryptographic algorithms in computer security research.…”
Get full text
Get full text
Get full text
Thesis -
10
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The deployment of network security procedures requires the implementation of Cryptographic algorithms. …”
Get full text
Get full text
Thesis -
11
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
12
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…Subsequent to this, this project focus on how to measure the security analysis on randomness test of image. The result of this project is the characteristics of 3D-AES is very high in security and this algorithm is resistance to all identified attacks, the system effectiveness and accuracies of the process. …”
Get full text
Get full text
Thesis -
13
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…In bulk data transfer, especially in large messages, the secured processing time takes much longer than non-secured processes. …”
Get full text
Get full text
Conference or Workshop Item -
14
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…For example, in bulk data transfer, especially in large messages, the secured processing time takes much longer than non-secured processes. …”
Get full text
Get full text
Get full text
Article -
15
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
16
-
17
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…The present situation demands extremely secured details of patients. Consequently, securing the patient's information from ransomware is the main challenge in the healthcare industry. …”
Get full text
Get full text
Article -
18
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
19
Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi
Published 2019“…This paper analyzes how information sent through mobile messaging application is being secured. …”
Get full text
Get full text
Student Project -
20
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The existing sequential and the proposed parallel algorithms were simulated successfully while preserving security properties. …”
Get full text
Get full text
Thesis
