Search Results - (( structures perceptions about algorithm ) OR ( java application matching algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Audience Responses to Newspaper Coverage of Floods in China: Victims Versus Onlookers by Ning, Li, Ting, Su Hie

    Published 2026
    “…The study involved semi-structured interviews with 20 participants living in China (13 flood victims and 7 onlookers who did not experience flood). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    AUDIENCE RESPONSES TO NEWSPAPER COVERAGE OF FLOODS IN CHINA: VICTIMS VERSUS ONLOOKERS by Ning, Li, Ting, Su Hie

    Published 2026
    “…The study involved semi-structured interviews with 20 participants living in China (13 flood victims and 7 onlookers who did not experience flood). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article