Search Results - parallel information connection algorithm
Search alternatives:
- information connection »
- parallel information »
- connection algorithm »
-
1
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…With more than 2 billion people connected to the Internet, information security has become a top priority. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the current (sequential) algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
5
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the sequential (current) algorithm.…”
Get full text
Get full text
Get full text
Article -
6
Design and implementation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayawi
Published 2015“…A parallel manipulator is a closed loop mechanism which consists of a moving platform that is connected to a fixed base by at least two kinematic chains in parallel. …”
Get full text
Get full text
Thesis -
7
Dynamic communication performance of a TESH network under the nonuniform traffic patterns
Published 2008Get full text
Get full text
Get full text
Proceeding Paper -
8
-
9
-
10
P2P-Based Image Recognition for Component Tracking in a Large Engineering Domain
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…This technique also introduces a multi thread based persistence layer, which supports early binding and parallel connection to the servers. All the replication servers established its connection through interfaces. …”
Get full text
Get full text
Thesis -
12
-
13
A review on security and privacy issues in E-learning and the MapReduce aproach
Published 2019“…Using the Internet leaves indelible tracks, such as log files, cookies and posts and effects on the privacy based on information as well. Therefore, the actions against security incidents increased since network-connected devices. …”
Get full text
Get full text
Get full text
Article
