Search Results - (( database application server algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- database application »
- application learning »
- application server »
- learning algorithm »
- server algorithm »
- java application »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
2
-
3
A Study Of Salting Method for Image Protection
Published 2013“…A simulation using MATLAB GUI along with MySQL phpMyAdmin database will be conducted, which will reflect the real world application in securing password in database. …”
Other -
4
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
-
8
-
9
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…A change of the main database is reflected, forwarded and applied at each of the replicated server which might be in a remote location. …”
Get full text
Get full text
Thesis -
10
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013Get full text
Get full text
Conference or Workshop Item -
11
Indoor Location Sensing Using WLAN IEEE 802.11b
Published 2008Get full text
Get full text
Conference or Workshop Item -
12
Application of Technology Acceptance Model on Database Normalizer
Published 2011“…This study provides a normalization algorithm to perform the 1NF, 2NF, and 3NF automatically based on Microsoft Access and SQL Server databases. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Developing a prototype e-commerce application with credit card validation and secure transaction
Published 2005“…The application also includes an online credit card validation module that validates credit cards against the Luhn Algorithm and predefined credit card prefixes.The application will accept three types of credit cards which are Mastercard,Visa and American Express.The application is developed on the NET platform using ASP.NET and Visual Basic NET scripting.Therefore,the application could run on all kinds of platform.The application requires a Microsoft Server based operating system and Microsoft SQL Server in order for it to run.The application has been tested and runs successfully both on a server and on a workstation with server settings.In short,this system is the solution to the problems of current e-commerce technology.…”
Get full text
Get full text
Undergraduates Project Papers -
15
-
16
Improving response time, availability and reliability through asynchronous replication technique in cluster architecture of web server cluster
Published 2010Get full text
Get full text
Conference or Workshop Item -
17
Pengurusan rantaian bekalan menggunakan MRP dan DRP di FAMA
Published 2005“…This system was implemented using Active Server Pages (ASP) as a programming language and Microsoft SQL Server 2000 as a database..…”
Get full text
Get full text
Thesis -
18
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
Get full text
Get full text
Thesis -
19
-
20
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
Published 2007“…It proposes a cryptography approach using RC5 as fast and strong block cipher encryption algorithm. In this application, the patient creates an encryption key to encrypt a medical care consultation inquiries and questions before he send it transit through the transport media to the system database. …”
Get full text
Get full text
Thesis
