Search Results - parallel integration ((encryption algorithm) OR (detection algorithm))

Search alternatives:

Refine Results
  1. 1

    Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase by Alaidaros, Hashem Mohammed, A. Rasid, Mohd Fadlee, Othman, Mohamed, Raja Abdullah, Raja Syamsul Azmir

    Published 2007
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Improving security performance with parallel crypto operations in SSL bulk data transfer by Alaidaros, Hashem Mohammed, Othman, Mohamed, A. Rasid, Mohd Fadlee

    Published 2009
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA) by Mohd Nazlee, Anas, Hussin, Fawnizu Azmadi, Zain Ali, Noohul Basheer

    Published 2010
    “…Result based on the integration of multiple block encryption in parallel shows throughput performance of up to 100MB/s or more than 7X performance gain.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA) by Mohd Nazlee, Anas, Hussin, Fawnizu Azmadi, Zain Ali, Noohul Basheer

    Published 2010
    “…Result based on the integration of multiple block encryption in parallel shows throughput performance of up to 100MB/s or more than 7X performance gain.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. Other storage encryption algorithms, i.e. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA by Ahmed, Shakil

    Published 2013
    “…In addition AES-XTS decryption modules were also designed. Also the parallel AES-XTS encryption and decryption design were used to develop integrated chip of AES-XTS on FPGA. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Tranformation of CPU-based Applications To Leverage on Graphics Processors using CUDA by Hussin, Fawnizu Azmadi, Mohd Nazlee, Anas, Zain Ali, Noohul Basheer

    Published 2010
    “…Successful attempt at porting Serpent encryption algorithm and Lattice Boltzmann Method provided up to 7 times throughput performance gain and up to 10 times execution time performance gain respectively over the CPU. …”
    Get full text
    Get full text
    Article
  8. 8

    Super Calculator using Compute Unified Device Architecture (CUDA) by Nazlee, Anas Mohd

    Published 2009
    “…Successful attempt at porting Serpent encryption algorithm and Lattice Boltzmann Method provided up to 7 times throughput performance gain and up to 10 times execution time performance gain respectively over the CPU. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    CPU-based Application Transformation to CUDA: Transformation of CPU-based Applications To Leverage on Graphics Processors using CUDA by Mohd Nazlee, Anas, Hussin, Fawnizu Azmadi

    Published 2012
    “…Successful attempt at porting Serpent encryption algorithm and Lattice Boltzmann Method provided up to 7 times throughput performance gain and up to 10 times execution time performance gain respectively over the CPU. …”
    Get full text
    Get full text
    Book
  10. 10

    FPGA implementation of CPFSK modulation techniques for HF data communication by Jaswar, Fitri Dewi, Sha'ameri, Ahmad Zuri

    Published 2003
    “…Further reduction in components is achieved hy adopting a multiplierless and parallel algorithm at the receiver module. This is proven by comparing with conventional noncoherent detection algorithm.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection by Yong, Guang

    Published 2019
    “…Therefore, two automated procedures are developed to determine these parameters iteratively. The FBTS integrated with automated edge-preserving regularization algorithm is implemented in C++ programming language executed in parallel computing. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission by Bhattacharjee, S., Rahim, L.B.A., Watada, J., Roy, A.

    Published 2020
    “…Moreover, multiple executions of distinct security algorithms for maintaining confidentiality and integrity reduce throughput and add a large number of additional bits as security overhead that hampers the robustness against data loss. …”
    Get full text
    Get full text
    Article
  15. 15

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Therefore, the core classifier in the hyper-heuristic approach of Intrusion Detection System (IDS) is developed to the parallel structure NN. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Accelerating FPGA-surf feature detection module by memory access reduction by Mohd. Yamani Idna, Idris, Nor Bakiah, Abd. Warif, Hamzah, Arof, Noorzaily, Mohamed Noor, Ainuddin Wahid, Abdul Wahab, Zaidi, Razak

    Published 2019
    “…One of the popular algorithm used is called the Speeded-Up Robust Features (SURF), which realized the scale space pyramid to detect the features. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    An Efficient Energy Aware Adaptive System-On-Chip Architecture For Real-Time Video Analytics by Ahmed, Hisham Ahmed Ali

    Published 2016
    “…A Performance model for Zynq is developed using analytical method and used in hardware/software codesign to facilitate algorithms mapping to hardware. Afterwards, an SoC for real-time video analytics is realized on Zynq using Harris corner detection algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…This research proposes a method for automatic detection of WMH in white matter (WM) tissue for MRI images. …”
    Get full text
    Get full text
    Book Section