Search Results - (( development program implication algorithm ) OR ( java data protection algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  4. 4

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Exploring the ethical dimensions of artificial intelligence and robotics in dental education by Sim, Galvin Siang Lin, Foo, Jia Yee, Goh, Shu Meng, Alam, Mohammad Khursheed

    Published 2024
    “…Dental curricula should in-corporate ethics, fostering collaborations between educators and AI/robotics experts. Professional development programs should prioritize ethics training, considering emerging technologies such as AI-powered learning and diagnostic assistance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Investigating the cognitive processes in solving management science problems by Cheng, Sheila, Siow, Heng Loke

    Published 2010
    “…The findings have implications for the development of effective MS/OR related subjects.…”
    Get full text
    Get full text
    Journal
  17. 17

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…This study's implication serves the safety system in the V2P context by programming the proposed framework as an application in smartphones for exchanging pedestrian information to the vehicles for avoiding accidents…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…This study's implication serves the safety system in the V2P context by programming the proposed framework as an application in smartphones for exchanging pedestrian information to the vehicles for avoiding accidents.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Capabilities and competencies related to leadership performance effectiveness in the context of change in Malaysian Higher Education Institutions / Majid Ghasemy by Majid , Ghasemy

    Published 2017
    “…Even though the results of this study have several theoretical, practical, and methodological implications, upgrading the contents and processes of leadership developmental programs in each of Malaysian HE sectors deems to be considerably crucial.…”
    Get full text
    Get full text
    Get full text
    Thesis