Search Results - (( data execution a algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The proposed DetectCombined is an innovated technique that execute a protection code based on a sequence of three stages: filtration-validation-history, this technique produces a robust protection code that distinguish between safe SQL commands and malicious ones, and reinforce the memory of detection procedure by saving previous SQL attacks in special tables in the remote database, regardless of the types of users whether a general user of admin. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad by Saima Gulzar, Ahmad

    Published 2017
    “…Eventually, the workflow is executed. The second algorithm is a variation in first algorithm in which data parallelism is introduced in each partition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Performance evaluation for different data encryption algorithms on wireless sensor network (WSN) by Mhawesh, Thoalfekarali Zuhair

    Published 2018
    “…The SF algorithm presented a good permanence with execution time (s) needed 0.006971s to encrypt the images before transmitted to the receiver station.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Development of efficient t-way test data generation algorithm and execution strategies by Khandakar Fazley, Rabbi

    Published 2012
    “…This strategy is able to reduce the number of test data, but the execution time is not optimized. (II) EasyA (Easy Algorithm for 2-way Test Data Generation) is developed based on matrix based calculation to overcome the time constrains by keeping the number of test data in an acceptable range. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Replica Creation Algorithm for Data Grids by Madi, Mohammed Kamel

    Published 2012
    “…This thesis presents a new replication algorithm that improves data access performance in data grids by distributing relevant data copies around the grid. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal by Fadzal, Ahmad Nazmi

    Published 2017
    “…ACO classification accuracy is compared to Genetic Algorithm classifier which also a wrapper method. On integration of the technique, ACO is proposed to work in a multicore-multithread environment to gain additional execution time advantage. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Parallel implementation on improved error signal of backpropagation algorithm by Mohd Aris, Teh Noranis

    Published 2001
    “…The BP algorithm uses the data partitioning method with columnwise block striped and the batch mode weight updating strategy. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An Experimental Study on Relationship between Performance and Energy Consumption of Serial and Parallel Text Searching Algorithm. by Isahak, Siti Zulaikha

    Published 2013
    “…The world data is growing vigorously intersecting of large ordered sets and it is a common problem in the evaluation of data queries to a search engine. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan by Khan, Abdul Nasir

    Published 2014
    “…To cope with the resource limitation of mobile devices, there are two approaches adopted in the literature while providing security services (a) local execution and (b) remote execution. In local execution approach, the computational complexities of cryptographic algorithms are reduced and the entire security operations are executed using limited computational power of mobile devices. …”
    Get full text
    Thesis
  12. 12

    Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing by Rahman, Gohar

    Published 2023
    “…The Internet of Things (IoT) envisions a world wherein everyday objects may connect to the internet and exchange data, analyse, store, and gather data from their environment and efficiently mediate on it. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing by Rahman, Gohar

    Published 2023
    “…The Internet of Things (IoT) envisions a world wherein everyday objects may connect to the internet and exchange data, analyse, store, and gather data from their environment and efficiently mediate on it. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Researchers have proposed automated testing tools to minimise the effort and resources spent on testing GUIs. A relatively simple strategy employed by the proposed tools thus far is the observe-select-execute approach, where all of a GUI’s actions on its current state are observed, one action is selected, and the selected action is executed on the software. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Static and self-scalable filter range selection algorithms for peer-to-peer networks by Kweh, Yeah Lun

    Published 2011
    “…The static filter range selection algorithm and the self-scalable selection algorithm are able to reduce the number of rounds and the number of messages needed, increase the success rate but longer execution time compared to the Loo (2005) selection algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20