Search Results - (( java application rsa algorithm ) OR ( parallel evaluation tool algorithm ))
Search alternatives:
- java application »
- application rsa »
- evaluation tool »
- tool algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
A spark-based parallel fuzzy C median algorithm for web log big data
Published 2022“…Based on the Rand Index and SSE (sum of squared error), the parallel Fuzzy C median algorithm's performance is evaluated in the PySpark platform. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
7
A critical analysis of simulators in grid
Published 2015“…Out of this, the developers have spent remarkable efforts to come up with simulators which facilitate the studies in this domain.In addition, these simulators have a significant role in enhancing and proposing many scheduling algorithms, and this in turn has reflected efficiently on the Grid.In this paper, we will present some of these tools, which are: GridSim for large scales distributed computing and parallel environment, Alea for tackling dynamic scheduling problems, Sim-G-Batch grid simulator for simulating the security and energy concept and Balls simulator for evaluation peer-to-peer with integrated load balancing algorithm.Furthermore, this paper aims to guide and assist the researcher to choose the proper tool that can fit the studied research area, by providing functionality analysis for the reviewed simulators.…”
Get full text
Get full text
Get full text
Article -
8
The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data
Published 2024“…Therefore, we develop a Parallel Fuzzy C-Median Clustering Algorithm Using Spark for Big Data that can handle large datasets while maintaining high accuracy and scalability. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
10
Synchronous gravitational search algorithm vs asynchronous gravitational search algorithm: a statistical analysis
Published 2014Get full text
Get full text
Conference or Workshop Item -
11
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…The first step lies at the modelling of parallel applications running on heterogeneous parallel computers. …”
Get full text
Get full text
Thesis -
12
Parallel system for abnormal cell growth prediction based on fast numerical simulation
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A new visual simulation tool for performance evaluation of MANET routing protocols
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
14
-
15
Automatic generic process migration system in linux
Published 2012“…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
Get full text
Get full text
Thesis -
16
Projecting named entity tags from a resource rich language to a resource poor language
Published 2012“…The method computes the string similarity between the English words and the list of available lexemes in a pre-built lexicon that approximates the best NE mapping.The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure.An evaluation of the selected open source NER tool for English is also presented.…”
Get full text
Get full text
Get full text
Article -
17
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…An evaluation of the selected open source NER tool for English is also presented.…”
Get full text
Get full text
Article -
18
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…An evaluation of the selected open source NER tool for English is also presented.…”
Get full text
Get full text
Article -
19
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…An evaluation of the selected open source NER tool for English is also presented.…”
Get full text
Get full text
Article -
20
A security payment model for financial payment using mykad
Published 2011“…However, if attack or intrusion is detected in less than 30 minutes, ARSA will automatically change the security algorithm to a new one. The evaluation of the MPM performance is measured with HP LoadRunner testing tools from which it is found that the response time of MPM with multithreading is better compared to the single thread model and credit card authorisation system. …”
Get full text
Get full text
Get full text
Get full text
Thesis
