Search Results - (( based application ((a algorithm) OR (_ algorithm)) ) OR ( code application among algorithms ))*
Search alternatives:
- based application »
- application among »
- code application »
- among algorithms »
- a algorithm »
-
1
-
2
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the current sequential algorithm. …”
Get full text
Get full text
Thesis -
3
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
4
-
5
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
6
An event-driven simulation for highest urgency first (HUF) : a latency and modulation aware bandwidth allocation algorithm for WiMAX base stations.
Published 2013“…This research has focused at developing a discrete-event simulator to implement bandwidth allocation algorithms for a WiMAX base station.The highest urgency first algorithm has been utilized as a benchmark deployment algorithm in order to provide: dynamic downlink/uplink adjustment and latency guarantee for real-time applications. …”
Get full text
Get full text
Article -
7
-
8
A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography
Published 2024Get full text
journal::journal article -
9
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
-
15
-
16
Computational simulation for static and dynamic load of rectangular plate in elastic region for analysis of impact resilient structure.
Published 2012“…The second objective is to utilize the computational algorithm for direct numerical simulation, and as a parallel scheme, commercial off-the shelf numerical code is utilized for parametric study, optimization and synthesis. …”
Get full text
Get full text
Conference or Workshop Item -
17
Accelerated black hole optimization algorithm with enhanced FOPID controller for omni-wheel drive mobile robot system
Published 2025“…These results demonstrate the potential of ACBHO-based optimization as a robust solution for improving control system performance in advanced mobile robotics applications.…”
Get full text
Get full text
Get full text
Article -
18
-
19
New entropy-based method for gene selection
Published 2009Get full text
Get full text
Get full text
Article -
20
Computational simulation for analysis and synthesis of impact resilient structure
Published 2013“…The second objective is to utilize the computational algorithm for direct numerical simulation, and as a parallel scheme, commercial off-the shelf numerical code is utilized for parametric study, optimization and synthesis. …”
Get full text
Get full text
Article
