Search Results - parallel integration ((selection algorithm) OR (((function algorithm) OR (encryption algorithm))))
Search alternatives:
- parallel integration »
- selection algorithm »
- function algorithm »
-
1
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Conference or Workshop Item -
2
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Get full text
Article -
3
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)
Published 2010“…Result based on the integration of multiple block encryption in parallel shows throughput performance of up to 100MB/s or more than 7X performance gain.…”
Get full text
Get full text
Conference or Workshop Item -
4
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)
Published 2010“…Result based on the integration of multiple block encryption in parallel shows throughput performance of up to 100MB/s or more than 7X performance gain.…”
Get full text
Get full text
Conference or Workshop Item -
5
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. Other storage encryption algorithms, i.e. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…This research algorithm demonstrated a very promising result with Support Vector Machines, this algorithm produces a 90% of accuracies whereas the decision tree algorithm gets 100% accuracies. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…In addition AES-XTS decryption modules were also designed. Also the parallel AES-XTS encryption and decryption design were used to develop integrated chip of AES-XTS on FPGA. …”
Get full text
Get full text
Thesis -
9
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The uniqueness of this approach lies in embedding an integrated scheduling function into a partially integrated process planning function in order to exploit the strategic potentials of flexibility and reconfigurability in manufacturing systems. …”
Get full text
Get full text
Thesis -
10
Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission
Published 2020“…Confidentiality and integrity are further enhanced by integrating advanced audio steganography that uses a distinctive sample selection for hiding bits. …”
Get full text
Get full text
Article -
11
Tranformation of CPU-based Applications To Leverage on Graphics Processors using CUDA
Published 2010“…Successful attempt at porting Serpent encryption algorithm and Lattice Boltzmann Method provided up to 7 times throughput performance gain and up to 10 times execution time performance gain respectively over the CPU. …”
Get full text
Get full text
Article -
12
Super Calculator using Compute Unified Device Architecture (CUDA)
Published 2009“…Successful attempt at porting Serpent encryption algorithm and Lattice Boltzmann Method provided up to 7 times throughput performance gain and up to 10 times execution time performance gain respectively over the CPU. …”
Get full text
Get full text
Final Year Project -
13
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
14
CPU-based Application Transformation to CUDA: Transformation of CPU-based Applications To Leverage on Graphics Processors using CUDA
Published 2012“…Successful attempt at porting Serpent encryption algorithm and Lattice Boltzmann Method provided up to 7 times throughput performance gain and up to 10 times execution time performance gain respectively over the CPU. …”
Get full text
Get full text
Book -
15
PID Parameters Improvement for AGC in Three Parallel-Connected Power Systems
Published 2016“…Integral Square Error (ISE) is considered as an objective function for both algorithms to determine its performance index value for the same parallel-connected power system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Parallel computation of maass cusp forms using mathematica
Published 2013“…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
Get full text
Get full text
Thesis -
17
VHDL modeling and simulation of the back-propagation algorithm and its mapping to the RM
Published 1993Get full text
Get full text
Get full text
Proceeding Paper -
18
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023“…The algorithm works by finding the minimum transmitter power with the help of Distributed Parallel Genetic Algorithm (DPGA) employed on an offload microcontroller system to form optimal beam coverage to reduce power usage of adaptive antenna at WCDMA base station. …”
Conference paper -
19
A critical analysis of simulators in grid
Published 2015“…In parallel and distributed computing environment such as "The Grid", anticipating the behavior of the resources and tasks based on certain scheduling algorithm is a great challenging.Thus, studying and improving these types of environments becomes very difficult. …”
Get full text
Get full text
Get full text
Article -
20
Neuro Symbolic Integration and Agent Based Modelling
Published 2018“…It has synaptic strength pattern which involve Lyapunov function E (energy function) for energy minimization events. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
