Search Results - parallel information ((extraction algorithm) OR (encryption algorithm))
Search alternatives:
- parallel information »
- extraction algorithm »
-
1
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Thesis -
2
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Conference or Workshop Item -
3
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Get full text
Article -
4
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
5
-
6
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005Get full text
Get full text
Final Year Project -
7
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…In addition, it uses two keys to encryption and decryption. However, this method needs to be develops and supports the protection of information. …”
Get full text
Get full text
Get full text
Thesis -
8
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
Get full text
Get full text
Thesis -
9
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…Due to the promising prospect ofchaotic encryption in the field ofcryptography, and the lack ofimplementation ofthis new encryption-decryption algorithm, this project focuses on introducing a new symmetric encryption-decryption scheme based on a chaos system for VoIP.…”
Get full text
Get full text
Final Year Project -
10
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…Current researchers have focused on DNA-based cryptography, in fact, DNA or deoxyribonucleic acid, has been applied in cryptography for performing computation as well as storing and transmitting information. In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. …”
Article -
11
Automated plant recognition system based on multi-objective parallel genetic algorithm and neural network
Published 2014“…To conclude, multi objective parallel genetic algorithm can automatically tune feed forward neural network to classify the dataset with a good classification rate.…”
Get full text
Get full text
Thesis -
12
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…This research algorithm demonstrated a very promising result with Support Vector Machines, this algorithm produces a 90% of accuracies whereas the decision tree algorithm gets 100% accuracies. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Parallelizing web scraping to improve performance and scalability
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
-
15
Projecting named entity tags from a resource rich language to a resource poor language
Published 2012“…Named Entities (NE) are the prominent entities appearing in textual documents.Automatic classification of NE in a textual corpus is a vital process in Information Extraction and Information Retrieval research. …”
Get full text
Get full text
Get full text
Article -
16
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…Automatic classification of NE in a textual corpus is a vital process in Information Extraction and Information Retrieval research. …”
Get full text
Get full text
Article -
17
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…Automatic classification of NE in a textual corpus is a vital process in Information Extraction and Information Retrieval research. …”
Get full text
Get full text
Article -
18
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…Automatic classification of NE in a textual corpus is a vital process in Information Extraction and Information Retrieval research. …”
Get full text
Get full text
Article -
19
Identifying The Ethical Issues In Twitter: A Knowledge Acquisition For Ontology
Published 2024“…Social media is an open platform to communicate, share and exchange information freely. This uncontrolled exchanged information carries out both negative and positive impacts in others’ lives. …”
Article -
20
Mapreduce algorithm for weather dataset
Published 2017“…The temperature, humidity and visibility attributes from the dataset has been extracted by the MapReduce Algorithm into structure data. …”
Get full text
Get full text
Thesis
