Search Results - (( using classification scheduling algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- classification scheduling »
- using classification »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Fuzzy C-Mean And Genetic Algorithms Based Scheduling For Independent Jobs In Computational Grid
Published 2006“…In this paper, we combine Fuzzy C-Mean and Genetic Algorithms which are popular algorithms, the Grid can be used for scheduling. …”
Get full text
Get full text
Article -
6
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, core routers which offer the schedule of different traffic using the marks they carry from the edge router. …”
Get full text
Get full text
Thesis -
7
Overview of metaheuristic: classification of population and trajectory
Published 2010“…Algorithms are used to find the solutions through the computer program. …”
Get full text
Get full text
Monograph -
8
A survey : particle swarm optimization-based algorithms for grid computing scheduling systems.
Published 2013“…This study surveys PSObased scheduling algorithms for Grid systems and presents a classification for the various approaches adopted. …”
Get full text
Get full text
Get full text
Article -
9
Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean
Published 2007“…Simulation runs demonstrate that our algorithm leads to better results than the traditional algorithms for scheduling policies used in Grid environment.…”
Get full text
Article -
10
File integrity monitor scheduling based on file security level classification
Published 2011“…This paper proposes an enhancement to the scheduling algorithm of the current file integrity monitoring approach by combining the off-line and on-line monitoring approach with dynamic inspection scheduling by performing file classification technique. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Text classification using Naive Bayes: An experiment to conference paper
Published 2005“…The basic text classification technique in forum application has been discussed in Sainin (2005a) and Sainin (2005b).The paper explains about the use of the basic naïve Bayes algorithm to classify forum text me ssages into two classes namely clean and bad. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
13
Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli
Published 2017“…Bat algorithm is chosen for the development of the prototype for segmentation and classification purpose. …”
Get full text
Get full text
Thesis -
14
Just Queuing: Policy-Based Scheduling Mechanism for Packet Switching Networks
Published 2011“…In terms of the complexity property, genetic algorithm has an advantage in holding the fitness score of the queue in separate storage space which potentially minimises the complexity of the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…Boruta algorithm is used to select features automatically for assisting the machine learning. …”
Get full text
Get full text
Get full text
Article -
17
Fault detection of aircraft engine components using fuzzy unordered rule induction algorithm
Published 2016Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
-
20
Development of Scoliotic spine severity detection using deep learning Algorithms
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper
