Search Results - (( developing web caching algorithm ) OR ( java application matching algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    A framework of rough cultural algorithms in optimizing mobile web caching performance by Sulaiman, Sarina, Shamsuddin, Siti Maryam, Abraham, Ajith, Sulaiman, Shahida

    Published 2007
    “…Consequently, The proposed caching scheme, Rough Cultural Algorithm (RCA) is developed to materialise the caching policies.…”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers by Asmawi, Aziah, Md Yasin, Sharifah, Mohd Shah, Nur Hazierah

    Published 2024
    “…The focus of this study specifically operating 3 evidence collection software forensic toolkits in one developed forensic toolkit called ForenWebSight (FWS). …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10 by Rayman, Dafiqah Mior, Asmawi, Aziah, Mohd Ariffin, Noor Afiza

    Published 2022
    “…By developing proofs-of-concept, this study presented a WBEC: Web Browsers EvidenceCollection Toolkit for improving the gathering of digital evidence kinds. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Enhancing unity-based AR with optimal lossless compression for digital twin assets by Hlayel, Mohammed, Hairulnizam, Mahdin, Hayajneh, Mohammad, AlDaajeh, Saleh H., Siti Salwani, Yaacob, Mazidah, Mat Rejab

    Published 2024
    “…Brotli emerged as a strong option for web-based AR/VR content, striking a balance between compression efficiency and decompression speed, outperforming Gzip in WebGL contexts. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11