Search Results - (( based applications security algorithm ) OR ( web application designing algorithm ))*
Search alternatives:
- application designing »
- designing algorithm »
- based applications »
- web application »
-
1
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…Motivated by a number of security experts in cloud computing, we proposed an innovative solution of authentication for cloud web-based applications. …”
Get full text
Get full text
Get full text
Thesis -
2
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
3
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
4
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…They possess a wide range of applications, spanning from guaranteeing the security of web traffic through protocols like SSL/TLS to encrypting confidential data stored on hard drives. …”
Get full text
Get full text
Thesis -
5
Microcontroller-based face recognition system with web-based application for car security
Published 2023“…A short message service (SMS) alert system was set up using a modem router to notify car owner in case of unauthorized user access. In addition, a web-based application was designed and developed to remotely control the car security access and to trigger the car alarm. …”
Article -
6
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
Get full text
Get full text
Get full text
Academic Exercise -
7
Web page design for electronic commerce / Lee Fong Wai
Published 2003Get full text
Get full text
Thesis -
8
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
Get full text
Get full text
Article -
9
Smart student timetable planner
Published 2025“…To achieve these objectives, the system adopts the Rapid Application Development (RAD) methodology, ensuring iterative design, prototyping, and user feedback integration throughout the process. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
11
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003Get full text
Get full text
Article -
12
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
15
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…The Web Application System program is designed for the client to configure a system (e.g calculates a load flow). …”
Get full text
Get full text
Thesis -
17
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
18
-
19
Web application vulnerabilities detection model
Published 2016“…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
20
