Search Results - (( java implication based algorithm ) OR ( using data a algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Boyer-Moore horspool algorithm used in content management system of data fast searching by Chan, Chung Hoong, M. A., Ameedeen

    Published 2017
    “…After a deep view on few fast searching algorithm as Boyer-Moore algorithm, Boyer-Moore Horspool algorithm, Brute-Force Algorithm, Knuth-Morris-Pratt algorithm and Rabin-Karp algorithm, this research paper chooses Boyer-Moore Horspool algorithm to used in the content management system in term of data Fast Searching. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…This is due to the cryptography operations that include the HMAC and symmetric encryptions. The thesis proposes a new algorithm that provides a significant performance gain in bulk data transfer without compromising the security. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Image Encrytion Using Block Based Transformation Algorithm by Bani Younes, Mohammad Ali, Jantan, Aman

    Published 2008
    “…The original image was divided into blocks, which were rearranged into a transformed image using a transformation algorithm presented here, and then the transformed image was encrypted using the Blowfish algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An extended ID3 decision tree algorithm for spatial data by Sitanggang, Imas Sukaesih, Yaakob, Razali, Mustapha, Norwati, Nuruddin, Ahmad Ainuddin

    Published 2011
    “…As in the ID3 algorithm that use information gain in the attribute selection, the proposed algorithm uses the spatial information gain to choose the best splitting layer from a set of explanatory layers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Clustering Spatial Data Using a Kernel-Based Algorithm by Awan, A. Majid, Md. Sap, Mohd. Noor

    Published 2005
    “…This paper presents a method for unsupervised partitioning of data using kernel methods which offer strength to deal with complex data non-linearly separable in input space. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Clustering chemical data set using particle swarm optimization based algorithm by Triyono, Triyono

    Published 2008
    “…Many algorithms had been applied to cluster chemical data set such as Ward’s algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    MapReduce algorithm for weather dataset by Majid, Mazlina A., Romli, Awanis, Ahmad, Noraziah, Hammad, Khalid Adam Ismail

    Published 2018
    “…The temperature, humidity and visibility attributes from the dataset has been extracted by the MapReduce Algorithm into structure data. Graphical analysis has been used to represent the result from the MapReduce Algorithm. …”
    Get full text
    Get full text
    Research Report
  11. 11

    Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad by Saima Gulzar, Ahmad

    Published 2017
    “…In the real time stream processing framework the experiments were performed using STORM with a use-case data-intensive workflow (EURExpressII). …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A new compression algorithm for small data communication in wireless sensor network by Tuama, Ammar Yaseen, Mohamed, Mohamad Afendee, Muhammed, Abdullah, Mohd Hanapi, Zurina

    Published 2017
    “…Using compression ratio, memory usage, number of instructions and execution speed as a comparison parameters, the proposed algorithm is measured against a set of existing algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Mapreduce algorithm for weather dataset by Khalid Adam, Ismail Hammad

    Published 2017
    “…The temperature, humidity and visibility attributes from the dataset has been extracted by the MapReduce Algorithm into structure data. Graphical analysis has been used to represent the result from the MapReduce Algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali by Ali, Hikma Farah

    Published 2019
    “…The file is encrypted and using this key to decrypt it. In this study existing algorithm DES is a symmetric-key block cipher. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…huge data is a big challenge. Clustering technique is able to find hidden patterns and to extract useful information from huge data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An improved self organizing map using jaccard new measure for textual bugs data clustering by Ahmed, Attika

    Published 2018
    “…This research attempts a comparative analysis of both the clustering algorithms and for attaining the results, a series of experiment has been conducted using Mozilla bugs data set. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    An improved self organizing map using jaccard new measure for textual bugs data clustering by Ahmed, Attika

    Published 2018
    “…This research attempts a comparative analysis of both the clustering algorithms and for attaining the results, a series of experiment has been conducted using Mozilla bugs data set. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Secure encryption in network using Data Encryption Standard (DES) for high security transmission by Abdullah, Nur Amila

    Published 2017
    “…The objective of this paper is to improve the security data by using DES algorithm. The substitution technique is applied with addition a XOR operator to enhance the DES algorithm as proposed. …”
    Get full text
    Get full text
    Student Project
  19. 19

    An Experiment of Ant Algorithms : Case Study of Kota Kinabalu Central Town by Nor Rafidah, Mohamad

    Published 2005
    “…Shortest path is one of the optimization problems that are difficult to solve. There are many algorithms that used to solve this problem. In this study, ant algorithms are used to find the shortest path using a real data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Data discovery algorithm for scientific data grid environment by Abdullah, Azizol, Othman, Mohamed, Sulaiman, Md. Nasir, Ibrahim, Hamidah, Othman, Abu Talib

    Published 2005
    “…By using this model, we study various discovery algorithms for locating data sets in a data grid system. …”
    Get full text
    Get full text
    Get full text
    Article