Search Results - (( java _ prevention algorithm ) OR ( using computing using algorithm ))
Search alternatives:
- prevention algorithm »
- using computing »
- using algorithm »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…Low-cost radio frequency identification (RFID) tags conforming to the EPCglobal Class-1 Generation-2 standard are inherently insecure due to computational constraints. This thesis proposed the use of both prevention and detection mechanisms to solve the security and privacy issues. …”
Get full text
Get full text
Thesis -
2
Message based random variable length key encryption algorithm.
Published 2009“…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
Get full text
Get full text
Article -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
Get full text
Get full text
Thesis -
4
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…It is a code with double shield protection that prevents unauthorized extraction or damaging the remote database in the server side due to malicious SQL injection. …”
Get full text
Get full text
Get full text
Article -
5
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…Genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…Task scheduling and resource allocation are essential aspects of cloud computing. This Study proposes task scheduling in cloud computing using a hybrid genetic algorithm, and bald eagle search proposed to solve the task scheduling problem. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Task scheduling in cloud computing environment using hybrid of genetic algorithm and naked mole rat algorithm (GA-NMRA)
Published 2022“…Task scheduling and resource allocation are essential aspects of cloud computing. This research proposes task scheduling in cloud computing using a hybrid genetic algorithm and naked mole rat algorithm to solve the task scheduling problem. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Task scheduling on computational grids using Gravitational Search Algorithm
Published 2014“…In this paper, Gravitational Search Algorithm (GSA), as one of the latest population-based metaheuristic algorithms, is used for task scheduling on computational Grids. …”
Get full text
Get full text
Article -
10
Dam haji game using A* search algorithm / Siti Farah Najwa Mukhlis
Published 2017“…Therefore many research have been done to develop this type of computer game by using the Al techniques. In Dam Haji game, the goal is to find the optimal movement to make, so A* algorithm, which is a pathfinding algorithm is used. …”
Get full text
Get full text
Thesis -
11
System program management environment in cloud computing using hybrid Genetic Algorithm and Moth Flame Optimization (GA-MFO)
Published 2022“…In this project, Genetic Algorithms (GA) is combine Moth Flame Optimization (MFO) to improve the cloud computing environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
13
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…The designed hybrid architecture and framework were tested using the above quantum algorithms and the existing quantum algorithms. …”
Get full text
Get full text
Thesis -
14
Modified workflow scheduling using hybrid PSO-GA algorithm in cloud computing
Published 2019“…The goal of the Hybrid GA-PSO algorithm is to reduce the makespan and cost and balance the load of dependent tasks in cloud computing environments over the heterogonous resources. …”
Get full text
Get full text
Thesis -
15
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…The proposed algorithm is evaluated using the WorkflowSim simulation with a real dataset. …”
Get full text
Get full text
Thesis -
16
Two objectives big data task scheduling using swarm intelligence in cloud computing
Published 2016“…On the other hand, scheduling algorithms; starting from traditional to Hyper-heuristic; are widely used in computing systems such as cloud computing to monitor the use of resources. …”
Get full text
Get full text
Get full text
Article -
17
Travelling Salesman Problem using Prim Algorithm in High Performance Computing
Published 2007“…To achieve this goal an efficient job scheduling algorithm system is an essential part of the High Performance Computing. …”
Get full text
Get full text
Final Year Project -
18
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
19
-
20
Adaptive DNA computing algorithm by using PCR and restriction enzyme
Published 2004“…The adaptive algorithm is designed based on Adleman-Lipton [3I paradigm of DNA computing, However, unlike the Adleman- Lipton architecture, a cutting operation has been introduced to the algorithm and the mechanism in which the molecules used by computation were feedback to the next cyclc was devised. …”
Get full text
Get full text
Book Section
