Search Results - (( solution application server algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1
  2. 2

    Improving the security and encryption performance of cloud storage by using elliptic curve cryptography by Ismaeel, Nooruldeen Qutaiba

    Published 2016
    “…In this thesis, we have proposed a security solution based on an ECC algorithm to improve the security and the performance of the data by dividing the file content and encrypting it on both the server and the client side. …”
    Get full text
    Get full text
    Thesis
  3. 3

    School teacher-subject allocation management system by Yap, Dennis Jian Yuan

    Published 2024
    “…This project will build STSAMS as a web-based application in React.js that is equipped with API server, database, and the allotment algorithm with the Scrum methodology. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Developing a prototype e-commerce application with credit card validation and secure transaction by M. A., Ameedeen

    Published 2005
    “…The application also includes an online credit card validation module that validates credit cards against the Luhn Algorithm and predefined credit card prefixes.The application will accept three types of credit cards which are Mastercard,Visa and American Express.The application is developed on the NET platform using ASP.NET and Visual Basic NET scripting.Therefore,the application could run on all kinds of platform.The application requires a Microsoft Server based operating system and Microsoft SQL Server in order for it to run.The application has been tested and runs successfully both on a server and on a workstation with server settings.In short,this system is the solution to the problems of current e-commerce technology.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5
  6. 6
  7. 7

    A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed by Nisar, K., Lawal, I.A., Abualsaud, K., El-Fouly, T.M.

    Published 2014
    “…The simulation results obtained for the application response time of the proposed Client-Server model show an improvement in network performance. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…In order to deliver the best presentation of content requested, the E-Learning system must possess a mechanism that not only capable of accurately discovering the characteristics and capabilities of a client's device but also capable of finding out about network and server resource availability. Three recurring issues need to be addressed when constructing such solutions: 1) How to identify the device characteristic and the capabilities of a device, 2) How to find out about network resource availability, and 3) How to adapt application behavior. …”
    Get full text
    Get full text
    Thesis
  9. 9

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11
  12. 12
  13. 13

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  14. 14

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  15. 15

    Ascertaining trust of information transmitted during a disaster by Yusoff Y., Bakar A.A., Aziz N., Ismail R., Ramli R.

    Published 2023
    “…One of the potential solutions is to use trust algorithm to identify the trusted information. …”
    Article
  16. 16

    Ascertaining trust of information transmitted during a disaster by Yusoff, Y., Bakar, A.A., Aziz, N., Ismail, R., Ramli, R.

    Published 2016
    “…One of the potential solutions is to use trust algorithm to identify the trusted information. …”
    Get full text
    Get full text
    Article
  17. 17

    Ascertaining trust of information transmitted during a disaster by Yusoff, Y., Bakar, A.A., Aziz, N., Ismail, R., Ramli, R.

    Published 2016
    “…One of the potential solutions is to use trust algorithm to identify the trusted information. …”
    Get full text
    Get full text
    Article
  18. 18

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Passenger Counting With Face Detection by Teoh, Han Wei

    Published 2020
    “…Passenger counting exhibits a wide variety of applications in the context of smart cities. Such applications range from retail analytics, queue management and space utilizations. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis