Search Results - (( web application ((rsa algorithm) OR (tree algorithm)) ) OR ( _ application max algorithm ))*
Search alternatives:
- web application »
- application max »
- tree algorithm »
- rsa algorithm »
- max algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
3
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
4
-
5
-
6
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
journal::journal article -
7
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
8
Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E
Published 2013Get full text
Get full text
Thesis -
9
Car dealership web application
Published 2022“…In this project, a web application and a web service were proposed and implemented. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX.
Published 2013“…Among the challenging issues in mobile WiMAX handover are unnecessary handover, handover failure and handover delay, which may affect real-time applications. …”
Get full text
Get full text
Article -
11
An event-driven simulation for highest urgency first (HUF) : a latency and modulation aware bandwidth allocation algorithm for WiMAX base stations.
Published 2013“…To strike an ideal balance in gauging these trade-offs and to further complement the repository of simulators, this paper presents the details of a general-purpose programming language based discrete event simulation for WiMAX. This research has focused at developing a discrete-event simulator to implement bandwidth allocation algorithms for a WiMAX base station.The highest urgency first algorithm has been utilized as a benchmark deployment algorithm in order to provide: dynamic downlink/uplink adjustment and latency guarantee for real-time applications. …”
Get full text
Get full text
Article -
12
OTS: an optimal tasks scheduling algorithm based on QoS in cloud computing network
Published 2019“…This study presents an optimal tasks scheduling algorithm by enhancing Max-Min algorithm. The simulation results have proven that the Proposed Optimal Tasks Scheduling OTS completes tasks execution with less execution time and higher performance compared with Max-Min and TS algorithms. …”
Get full text
Get full text
Article -
13
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…To address these problems, this research proposes three new distributed static batch mode inspired algorithms. The first (proposed) algorithm is based on Min-Min, called Min-Diff, the second algorithm is based on Max-Min, called Max-Average, and the third algorithm is to handle the load balancing, called Efficient Load Balancing (ELB). …”
Get full text
Get full text
Get full text
Thesis -
14
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
15
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems
Published 2016“…These problems motivated to propose Max Degres Around (MDA) approximation algorithm for the MVC problem. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Fair uplink bandwidth allocation and latency guarantee for mobile WiMAX using fuzzy adaptive deficit round robin
Published 2014“…In this paper, an efficient bandwidth allocation algorithm for the uplink traffic in mobile WiMAX is proposed. …”
Get full text
Get full text
Get full text
Article -
19
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
20
Cyberbullying detection: a machine learning approach
Published 2022“…Machine learning is a hot topic and it is widely implemented in software, web application and more. Those algorithms are used in the classification or regression model to predict an input. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
