Search Results - (( java application modified algorithm ) OR ( java communication issues algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2
  3. 3

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…Another proposed algorithm is replica placement algorithm which selects and places only one replica in each cluster. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The provider, which is an open source library, is used to provide the secure communication channel. The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil by Idris, Siti Aishah, Ahmad Fadzil, Ahmad Firdaus

    Published 2024
    “…The model will be designed and developed using a deep learning algorithm, which is YOLOv8, the latest version of YOLO. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  12. 12