Search Results - (( java application using algorithm ) OR ( data protection system algorithm ))
Search alternatives:
- protection system »
- java application »
- system algorithm »
- using algorithm »
-
1
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
Get full text
Get full text
Thesis -
6
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We used a Drebin data sample, which is a collection of 5,560 applications, as well as clean data sample containing 1,846 applications. …”
Get full text
Get full text
Get full text
Thesis -
7
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
-
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
Discovering decision algorithm from a distance relay event report
Published 2009“…Nowadays protection engineers are suffering from very complex implementations of protection system analysis due to massive quantities of data coming from diverse points of intelligent electronic devices. …”
Get full text
Get full text
Get full text
Article -
12
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…With the association rule in hand, a distance relay performance analysis Expert System called Protective Relay Analysis System (PRAY) had been designed. …”
Get full text
Get full text
Thesis -
13
Enhanced Storage Mechanism for Secured Parallel Network File System
Published 2018“…The prime focus is on file locking techniques, state maintenance of file locks and layouts, data compression and data protection across network attached storage and parallel network file system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Cryptographic Algorithm Using Matrix Inversion as Data Protection
Published 2011“…The algorithms were tested with samples of real data and the result practically demonstrated how systems of non-linear equations turned into linear equations are indeed of relevance in providing strong and complex encryption and decryption keys to protect sensitive information in store or in transit via unsecure channels. …”
Get full text
Get full text
Get full text
Article -
15
Prediction of cascading collapse occurrence due to the effect of hidden failure protection system using different training algorithms feed-forward neural network / N. H. Idris ...[...
Published 2017“…Protection system plays a significant role in power system and operation of electrical networks especially in transmission system. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
A Study And Analysis Of Watermarking Algorithms For Medical Images
Published 2010Get full text
Get full text
Thesis -
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Development of Lightning Protection System (LPS) Designing Tool
Published 2015“…Where, Lightning Protection Systems is a system that is installed on building structures to protect it from the lightning strike being diverted. …”
Get full text
Get full text
Final Year Project
