Search Results - (( data execution _ algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad by Saima Gulzar, Ahmad

    Published 2017
    “…Eventually, the workflow is executed. The second algorithm is a variation in first algorithm in which data parallelism is introduced in each partition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Performance evaluation for different data encryption algorithms on wireless sensor network (WSN) by Mhawesh, Thoalfekarali Zuhair

    Published 2018
    “…The performance metrics studied are the energy dissipation, execution time, and size of encryption data. The results of evaluation AES, SF and SIT algorithms in terms of encrypted data size (bytes) showed that, the SIT algorithm produce the lowest size for all encrypted Images which is below 90250bytes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Development of efficient t-way test data generation algorithm and execution strategies by Khandakar Fazley, Rabbi

    Published 2012
    “…An executable prototype tool is also developed for auto test execution besides efficient test data generation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Replica Creation Algorithm for Data Grids by Madi, Mohammed Kamel

    Published 2012
    “…The new Data Replica Creation Algorithm (DRCM) improves performance of data grid systems by reducing job execution time and making the best use of data grid resources (network bandwidth and storage space). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Parallel implementation on improved error signal of backpropagation algorithm by Mohd Aris, Teh Noranis

    Published 2001
    “…The experiments are implemented using the Sequent Symmetry SE30 parallel machine. The BP algorithm uses the data partitioning method with columnwise block striped and the batch mode weight updating strategy. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal by Fadzal, Ahmad Nazmi

    Published 2017
    “…In the age of wide digital usage, text classification is one of the significant prominent attribute required in order to automatically arrange emails, articles, and other textual data in an organization. Unclassified data can lead to slower data retrieval thus a reliable method is required to effectively retrieve data efficiently and in systematic manner. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An Experimental Study on Relationship between Performance and Energy Consumption of Serial and Parallel Text Searching Algorithm. by Isahak, Siti Zulaikha

    Published 2013
    “…The amount of energy produced should be reduced along with the execution time to increase performance in data searching. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing by Rahman, Gohar

    Published 2023
    “…The OCTOPUS++ is evaluated in terms of execution time. The average execution time for 20-time execution of OCTOPUS++ is 1.018917 milliseconds. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing by Rahman, Gohar

    Published 2023
    “…The OCTOPUS++ is evaluated in terms of execution time. The average execution time for 20-time execution of OCTOPUS++ is 1.018917 milliseconds. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Comparison study of sorting techniques in dynamic data structure by Abbas, Zeyad Adnan

    Published 2016
    “…The execution time for the five sorting algorithms of each group of data elements were computed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Comparison study of sorting techniques in dynamic data structure by Abbas, Zeyad Adnan

    Published 2016
    “…The execution time for the five sorting algorithms of each group of data elements were computed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan by Khan, Abdul Nasir

    Published 2014
    “…To cope with the resource limitation of mobile devices, there are two approaches adopted in the literature while providing security services (a) local execution and (b) remote execution. In local execution approach, the computational complexities of cryptographic algorithms are reduced and the entire security operations are executed using limited computational power of mobile devices. …”
    Get full text
    Thesis
  16. 16
  17. 17

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Static and self-scalable filter range selection algorithms for peer-to-peer networks by Kweh, Yeah Lun

    Published 2011
    “…The static filter range selection algorithm and the self-scalable selection algorithm are able to reduce the number of rounds and the number of messages needed, increase the success rate but longer execution time compared to the Loo (2005) selection algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
    Get full text
    Get full text
    Get full text
    Thesis