Search Results - parallel integration ((encryption algorithm) OR (((selection algorithm) OR (detection algorithm))))
Search alternatives:
- parallel integration »
-
1
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Conference or Workshop Item -
2
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Get full text
Article -
3
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)
Published 2010“…Result based on the integration of multiple block encryption in parallel shows throughput performance of up to 100MB/s or more than 7X performance gain.…”
Get full text
Get full text
Conference or Workshop Item -
4
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)
Published 2010“…Result based on the integration of multiple block encryption in parallel shows throughput performance of up to 100MB/s or more than 7X performance gain.…”
Get full text
Get full text
Conference or Workshop Item -
5
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. Other storage encryption algorithms, i.e. …”
Get full text
Get full text
Get full text
Thesis -
6
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
8
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…In addition AES-XTS decryption modules were also designed. Also the parallel AES-XTS encryption and decryption design were used to develop integrated chip of AES-XTS on FPGA. …”
Get full text
Get full text
Thesis -
9
Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission
Published 2020“…Confidentiality and integrity are further enhanced by integrating advanced audio steganography that uses a distinctive sample selection for hiding bits. …”
Get full text
Get full text
Article -
10
Tranformation of CPU-based Applications To Leverage on Graphics Processors using CUDA
Published 2010“…Successful attempt at porting Serpent encryption algorithm and Lattice Boltzmann Method provided up to 7 times throughput performance gain and up to 10 times execution time performance gain respectively over the CPU. …”
Get full text
Get full text
Article -
11
Super Calculator using Compute Unified Device Architecture (CUDA)
Published 2009“…Successful attempt at porting Serpent encryption algorithm and Lattice Boltzmann Method provided up to 7 times throughput performance gain and up to 10 times execution time performance gain respectively over the CPU. …”
Get full text
Get full text
Final Year Project -
12
CPU-based Application Transformation to CUDA: Transformation of CPU-based Applications To Leverage on Graphics Processors using CUDA
Published 2012“…Successful attempt at porting Serpent encryption algorithm and Lattice Boltzmann Method provided up to 7 times throughput performance gain and up to 10 times execution time performance gain respectively over the CPU. …”
Get full text
Get full text
Book -
13
Parallel computation of maass cusp forms using mathematica
Published 2013“…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
Get full text
Get full text
Thesis -
14
FPGA implementation of CPFSK modulation techniques for HF data communication
Published 2003“…Further reduction in components is achieved hy adopting a multiplierless and parallel algorithm at the receiver module. This is proven by comparing with conventional noncoherent detection algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Distributed parallel deep learning with a hybrid backpropagation-particle swarm optimization for community detection in large complex networks
Published 2022“…In this paper, a parallel deep learning-based community detection method in large complex networks (CNs) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection
Published 2019“…Therefore, two automated procedures are developed to determine these parameters iteratively. The FBTS integrated with automated edge-preserving regularization algorithm is implemented in C++ programming language executed in parallel computing. …”
Get full text
Get full text
Thesis -
17
-
18
Accelerating FPGA-surf feature detection module by memory access reduction
Published 2019“…One of the popular algorithm used is called the Speeded-Up Robust Features (SURF), which realized the scale space pyramid to detect the features. …”
Get full text
Get full text
Get full text
Article -
19
FPGA implementation of MCPFSK modulation for HF data communication
Published 2009Get full text
Working Paper -
20
Design and implementation of multimedia digital matrix system
Published 2005“…The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
Get full text
Get full text
Conference or Workshop Item
