Search Results - (( data execution between algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The proposed DetectCombined is an innovated technique that execute a protection code based on a sequence of three stages: filtration-validation-history, this technique produces a robust protection code that distinguish between safe SQL commands and malicious ones, and reinforce the memory of detection procedure by saving previous SQL attacks in special tables in the remote database, regardless of the types of users whether a general user of admin. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Performance evaluation for different data encryption algorithms on wireless sensor network (WSN) by Mhawesh, Thoalfekarali Zuhair

    Published 2018
    “…The performance metrics studied are the energy dissipation, execution time, and size of encryption data. The results of evaluation AES, SF and SIT algorithms in terms of encrypted data size (bytes) showed that, the SIT algorithm produce the lowest size for all encrypted Images which is below 90250bytes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    An Experimental Study on Relationship between Performance and Energy Consumption of Serial and Parallel Text Searching Algorithm. by Isahak, Siti Zulaikha

    Published 2013
    “…In this paper, text searching algorithm is using to study the relationship between performance of computer and amount of energy produced in serial and parallel text searching algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Replica Creation Algorithm for Data Grids by Madi, Mohammed Kamel

    Published 2012
    “…The new Data Replica Creation Algorithm (DRCM) improves performance of data grid systems by reducing job execution time and making the best use of data grid resources (network bandwidth and storage space). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Frequency aware task scheduling using DVFS for energy efficiency in Cloud data centre by Samual, Joshua, Hussin, Masnida, Abdul Hamid, Nor Asilah Wati, Abdullah, Azizol

    Published 2023
    “…It makes the Cloud data centre increase the number of virtual machines (VM) to execute the users tasks. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…The critical factors of complexity at application level include data size and data rate of continuously streaming data, the selection of data fusion and data preprocessing methods, the choice of learning models, learning rates and learning modes, and the adoption of data mining algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique by Nahla Mohammedelzein, Elawad Babiker

    Published 2021
    “…The result revealed that there is a strong correlation between execution time and throughput with a strength of 99.9% percent as confirmed by the Pearson correlation coefficient. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Handover algorithm with joint processing technique based on coordinated multipoint (COMP) transmission and reception in LTE-advanced heterogeneous network / Muhammad Aiman Zainali by Zainali, Muhammad Aiman

    Published 2020
    “…It is predicted that in the near future there will be an increase demand of voice traffic and data traffic. One of the important parts in communication is handover execution. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    An Edge-Wise Linear Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs by Qureshi, M.A., Hassan, M.F., Safdar, S., Akbar, R., Sammi, R.

    Published 2010
    “…The main advantage of the algorithms is its simplicity and it does not need complex data structures for implementations.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Comparison of ECC and RSA algorithms in IOT devices by Vahdati, Zeinab, Md Yasin, Sharifah, Nesheli, Ali Ghasempour, Salehi, Mohammad

    Published 2019
    “…Hence, thoughtfully chosen and practically tested encryption algorithm must be performed to enhance the device efficiency and decrease the risk of sensitive data exposure. …”
    Get full text
    Get full text
    Article
  18. 18

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…Keywords are manually randomly selected from the files and executed between three to five numbers of keyword. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Design of a flexible digital baseband signal processing algorithm by Mohamad, Rosalina, Harun, Harlisya, Nuzli, Mohamad Anas, Dimyati, Kaharudin

    Published 2006
    “…Performance comparisons between the existing algorithm and the proposed algorithm are proven in terms of cycle count and real-time capability.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. …”
    Article