Search Results - (( its application ((rsa algorithm) OR (new algorithm)) ) OR ( job application using algorithm ))*
Search alternatives:
- its application »
- job application »
- using algorithm »
- rsa algorithm »
- new algorithm »
-
1
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
2
Ant colony optimization algorithm for dynamic scheduling of jobs in computational grid
Published 2012“…Job scheduling problem is classified as an NP-hard problem.Such a problem can be solved only by using approximate algorithms such as heuristic and meta-heuristic algorithms.Among different optimization algorithms for job scheduling, ant colony system algorithm is a popular meta-heuristic algorithm which has the ability to solve different types of NP-hard problems.However, ant colony system algorithm has a deficiency in its heuristic function which affects the algorithm behavior in terms of finding the shortest connection between edges.This research focuses on a new heuristic function where information about recent ants’ discoveries has been considered.The new heuristic function has been integrated into the classical ant colony system algorithm.Furthermore, the enhanced algorithm has been implemented to solve the travelling salesman problem as well as in scheduling of jobs in computational grid.A simulator with dynamic environment feature to mimic real life application has been development to validate the proposed enhanced ant colony system algorithm. …”
Get full text
Get full text
Monograph -
3
New heuristic function in ant colony system for job scheduling in grid computing
Published 2012Get full text
Get full text
Conference or Workshop Item -
4
-
5
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
6
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
7
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
8
Impatient job scheduling under cloud computing
Published 2012“…The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
12
-
13
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
14
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…Modelling refers to constructing a model to depict the structure of the application with its tasks and describing the interactions between them. …”
Get full text
Get full text
Thesis -
16
-
17
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item -
18
Impatient task mapping in elastic cloud using genetic algorithm
Published 2011Get full text
Get full text
Get full text
Article -
19
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
20
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015Get full text
Get full text
Conference or Workshop Item
