Search Results - (( data execution between algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- execution between »
- between algorithm »
- implication based »
- java implication »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The proposed DetectCombined is an innovated technique that execute a protection code based on a sequence of three stages: filtration-validation-history, this technique produces a robust protection code that distinguish between safe SQL commands and malicious ones, and reinforce the memory of detection procedure by saving previous SQL attacks in special tables in the remote database, regardless of the types of users whether a general user of admin. …”
Get full text
Get full text
Get full text
Article -
2
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…The performance metrics studied are the energy dissipation, execution time, and size of encryption data. The results of evaluation AES, SF and SIT algorithms in terms of encrypted data size (bytes) showed that, the SIT algorithm produce the lowest size for all encrypted Images which is below 90250bytes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
An Experimental Study on Relationship between Performance and Energy Consumption of Serial and Parallel Text Searching Algorithm.
Published 2013“…In this paper, text searching algorithm is using to study the relationship between performance of computer and amount of energy produced in serial and parallel text searching algorithm. …”
Get full text
Get full text
Final Year Project -
4
Replica Creation Algorithm for Data Grids
Published 2012“…The new Data Replica Creation Algorithm (DRCM) improves performance of data grid systems by reducing job execution time and making the best use of data grid resources (network bandwidth and storage space). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
7
Frequency aware task scheduling using DVFS for energy efficiency in Cloud data centre
Published 2023“…It makes the Cloud data centre increase the number of virtual machines (VM) to execute the users tasks. …”
Get full text
Get full text
Article -
8
-
9
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
Get full text
Get full text
Get full text
Thesis -
10
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
11
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…The critical factors of complexity at application level include data size and data rate of continuously streaming data, the selection of data fusion and data preprocessing methods, the choice of learning models, learning rates and learning modes, and the adoption of data mining algorithms. …”
Get full text
Get full text
Get full text
Thesis -
12
Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique
Published 2021“…The result revealed that there is a strong correlation between execution time and throughput with a strength of 99.9% percent as confirmed by the Pearson correlation coefficient. …”
Get full text
Get full text
Thesis -
13
Handover algorithm with joint processing technique based on coordinated multipoint (COMP) transmission and reception in LTE-advanced heterogeneous network / Muhammad Aiman Zainali
Published 2020“…It is predicted that in the near future there will be an increase demand of voice traffic and data traffic. One of the important parts in communication is handover execution. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
An Edge-Wise Linear Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
Published 2010“…The main advantage of the algorithms is its simplicity and it does not need complex data structures for implementations.…”
Get full text
Get full text
Conference or Workshop Item -
17
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…Hence, thoughtfully chosen and practically tested encryption algorithm must be performed to enhance the device efficiency and decrease the risk of sensitive data exposure. …”
Get full text
Get full text
Article -
18
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…Keywords are manually randomly selected from the files and executed between three to five numbers of keyword. …”
Get full text
Get full text
Thesis -
19
Design of a flexible digital baseband signal processing algorithm
Published 2006“…Performance comparisons between the existing algorithm and the proposed algorithm are proven in terms of cycle count and real-time capability.…”
Get full text
Get full text
Conference or Workshop Item -
20
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. …”
Article
