Search Results - (( java implementing conversion algorithm ) OR ( java prevention using algorithm ))
Search alternatives:
- conversion algorithm »
- java implementing »
- prevention using »
- java prevention »
- using algorithm »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…This thesis proposed the use of both prevention and detection mechanisms to solve the security and privacy issues. …”
Get full text
Get full text
Thesis -
3
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Interview was conducted to get an overview of programming experts towards using Hybrid Obfuscation Technique to prevent prohibited Reverse Engineering. …”
Get full text
Get full text
Thesis -
5
Message based random variable length key encryption algorithm.
Published 2009“…Value of random number should be greater than 35 bits and plaintext must be at least 7 bits. A padding algorithm was used for small size messages or big random numbers. …”
Get full text
Get full text
Article -
6
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
Get full text
Get full text
Monograph -
7
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
8
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
9
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To prevent overfitting, early stopping is used to monitor validation loss during training and dropout rate of 0.3 are applied. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
