Search Results - (( some application based algorithm ) OR ( web application ((rsa algorithm) OR (_ algorithm)) ))*
Search alternatives:
- application based »
- some application »
- web application »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. …”
Get full text
Get full text
Thesis -
3
Web application vulnerabilities detection model
Published 2016“…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
4
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Although the web tool has some limitation which it can hold back the user experience on this web tool, but there are always room for improvement.…”
Get full text
Get full text
Thesis -
5
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
7
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
8
-
9
School teacher-subject allocation management system
Published 2024“…This project will build STSAMS as a web-based application in React.js that is equipped with API server, database, and the allotment algorithm with the Scrum methodology. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…In modern society, with the advent of technology, people can easily share information, interact with each other and do their job on an online platform. Based on the previous report, some issues arise, such as time-consumption between the staff and the customer when ordering, lack of details and inconsistency of the manual system data. …”
Get full text
Get full text
Thesis -
11
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…The Marine Predators Algorithm (MPA) is classified under swarm intelligence methods based on its type of inspiration. …”
Get full text
Get full text
Article -
12
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…The Marine Predators Algorithm (MPA) is classified under swarm intelligence methods based on its type of inspiration. …”
Get full text
Get full text
Article -
13
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…In conclusion, based on the ten (10) scenario, the failure error 404 and 500 occur in ICMP based monitoring, which in the network layer while congestion issue in HTTP based monitoring, which is in the application layer. …”
Get full text
Get full text
Thesis -
14
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…—The Marine Predators Algorithm (MPA) is classified under swarm intelligence methods based on its type of inspiration. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
Get full text
Get full text
Thesis -
17
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
Get full text
Get full text
Article -
18
Efficient skyline processing algorithm over dynamic and incomplete database
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…As for the running method the compilation of the code will be run by using cmd and Ant Apache and the total average result of 30 simulation will be view on the web base application will be run using xampp.…”
Get full text
Get full text
Get full text
Academic Exercise -
20
A Dijkstra’s Mobile Web Application Engine for Generating Integrated Light Rail Transit Route
Published 2010“…In previous research we are implemented the mobile web application using rules based algorithm where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
Get full text
Get full text
Get full text
Article
