Search Results - (( data execution a algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- execution a »
- a algorithm »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The proposed DetectCombined is an innovated technique that execute a protection code based on a sequence of three stages: filtration-validation-history, this technique produces a robust protection code that distinguish between safe SQL commands and malicious ones, and reinforce the memory of detection procedure by saving previous SQL attacks in special tables in the remote database, regardless of the types of users whether a general user of admin. …”
Get full text
Get full text
Get full text
Article -
2
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…Eventually, the workflow is executed. The second algorithm is a variation in first algorithm in which data parallelism is introduced in each partition. …”
Get full text
Get full text
Get full text
Thesis -
3
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…The SF algorithm presented a good permanence with execution time (s) needed 0.006971s to encrypt the images before transmitted to the receiver station.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Development of efficient t-way test data generation algorithm and execution strategies
Published 2012“…This strategy is able to reduce the number of test data, but the execution time is not optimized. (II) EasyA (Easy Algorithm for 2-way Test Data Generation) is developed based on matrix based calculation to overcome the time constrains by keeping the number of test data in an acceptable range. …”
Get full text
Get full text
Thesis -
5
Replica Creation Algorithm for Data Grids
Published 2012“…This thesis presents a new replication algorithm that improves data access performance in data grids by distributing relevant data copies around the grid. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal
Published 2017“…ACO classification accuracy is compared to Genetic Algorithm classifier which also a wrapper method. On integration of the technique, ACO is proposed to work in a multicore-multithread environment to gain additional execution time advantage. …”
Get full text
Get full text
Thesis -
8
Parallel implementation on improved error signal of backpropagation algorithm
Published 2001“…The BP algorithm uses the data partitioning method with columnwise block striped and the batch mode weight updating strategy. …”
Get full text
Get full text
Thesis -
9
An Experimental Study on Relationship between Performance and Energy Consumption of Serial and Parallel Text Searching Algorithm.
Published 2013“…The world data is growing vigorously intersecting of large ordered sets and it is a common problem in the evaluation of data queries to a search engine. …”
Get full text
Get full text
Final Year Project -
10
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
Published 2014“…To cope with the resource limitation of mobile devices, there are two approaches adopted in the literature while providing security services (a) local execution and (b) remote execution. In local execution approach, the computational complexities of cryptographic algorithms are reduced and the entire security operations are executed using limited computational power of mobile devices. …”
Get full text
Thesis -
12
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
Published 2023“…The Internet of Things (IoT) envisions a world wherein everyday objects may connect to the internet and exchange data, analyse, store, and gather data from their environment and efficiently mediate on it. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
Published 2023“…The Internet of Things (IoT) envisions a world wherein everyday objects may connect to the internet and exchange data, analyse, store, and gather data from their environment and efficiently mediate on it. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Improving the tool for analyzing Malaysia’s demographic change: data standardization analysis to form geo-demographics classification profiles using k-means algorithms
Published 2016“…The rationale was that standardized data would simplify the execution of k-means algorithm. …”
Get full text
Get full text
Get full text
Article -
15
A Modified LRE-TL Real-Time Multiprocessor Scheduling Algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
16
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Researchers have proposed automated testing tools to minimise the effort and resources spent on testing GUIs. A relatively simple strategy employed by the proposed tools thus far is the observe-select-execute approach, where all of a GUI’s actions on its current state are observed, one action is selected, and the selected action is executed on the software. …”
Get full text
Get full text
Get full text
Thesis -
17
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. …”
Get full text
Get full text
Thesis -
18
-
19
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…The static filter range selection algorithm and the self-scalable selection algorithm are able to reduce the number of rounds and the number of messages needed, increase the success rate but longer execution time compared to the Loo (2005) selection algorithm. …”
Get full text
Get full text
Thesis -
20
