Search Results - (( job application based algorithm ) OR ( its application ((rsa algorithm) OR (based algorithm)) ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A new priority rule cloud scheduling technique that utilizes gaps to increase the efficiency of jobs distribution by Saydul Akbar, Murad

    Published 2023
    “…In this thesis, first a Priority-Based Fair Scheduling (PBFS) algorithm has been introduced to schedule jobs so that jobs get access to the required resources at optimal times. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Experimental performance analysis of job scheduling algorithms on computational grid using real workload traces by Shah, S.N.M., Mahmood, A.K., Rubab, S., Hassan, M.F.

    Published 2017
    “…The main thrust of this work was to conduct a quality of service based experimental performance evaluation of job scheduling algorithms on computational Grid in true dynamic environment. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Impatient job scheduling under cloud computing by Mahdi, Nawfal A.

    Published 2012
    “…The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures by Koohi, Sina Zangbari

    Published 2020
    “…MEMPHA, a hypergraphs-based model, aims to aspire to the challenge by providing topology modelling of the target parallel machine and application modelling of the parallel application, which is hypergraph-based model, to abstract the details of HPAs. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
    Get full text
    Get full text
    Get full text
    Article