Search Results - (( ((simulation using) OR (solution using)) data algorithm ) OR ( java implication _ algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Simulated annealing algorithm for scheduling divisible load in large scale data grids. by Abdullah, Monir, Othman, Mohamad, Ibrahim, Hamidah, Subramaniam, Shamala

    Published 2009
    “…Many Scheduling approaches have been studied but there is no optimal solution. This paper proposes a novel Simulated Annealing (SA) algorithm for scheduling divisible load in large scale data grids. …”
    Get full text
    Get full text
    Article
  3. 3

    An Experiment of Ant Algorithms : Case Study of Kota Kinabalu Central Town by Nor Rafidah, Mohamad

    Published 2005
    “…Both algorithms are compared. Simulation is used as a method in this study. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Simulated annealing algorithm for scheduling divisible load in large scale data grids by Abdullah, Monir, Othman, Mohamed, Ibrahim, Hamidah, K. Subramaniam, Shamala

    Published 2008
    “…This paper proposes a novel simulated annealing (SA) algorithm for scheduling divisible load in large scale data grids. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Physics-guided deep neural network to characterize non-Newtonian fluid flow for optimal use of energy resources by Kumar, A., Ridha, S., Narahari, M., Ilyas, S.U.

    Published 2021
    “…The proposed DNN algorithm is structured to incorporate initial/boundary conditions in cylindrical coordinates and approximate the solution without the aid of any simulated or training data. …”
    Get full text
    Get full text
    Article
  7. 7

    Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors by Binajjaj, Saeed Ali Saeed

    Published 2010
    “…Finally, the algorithms‘ robustness against the noisy data was evaluated using two simulated experiments with signal-to-noise ratios of 6 and 8 dB respectively.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Artificial neural network and inverse solution method for assisted history matching of a reservoir model by Negash, B.M., Vel, A., Elraies, K.A.

    Published 2017
    “…This allows to directly simulate the trained neural network and avoid the use of objective function and optimization algorithm. …”
    Get full text
    Get full text
    Article
  10. 10

    Application of boundary-fitted convolutional neural network to simulate non-Newtonian fluid flow behavior in eccentric annulus by Kumar, A., Ridha, S., Ilyas, S.U., Dzulkarnain, I., Pratama, A.

    Published 2022
    “…This research aims to simulate a Power-Law non-Newtonian fluid in an eccentric annulus with a convolutional network without using training data. …”
    Get full text
    Get full text
    Article
  11. 11

    A Hybrid of Ant Colony Optimization Algorithm and Simulated Annealing for Classification Rules by Rizauddin, Saian

    Published 2013
    “…Benchmark data sets from various fields were used to test the proposed algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Algorithms are developed for a simulated mobile robot that uses an array of range finders for navigation. …”
    Get full text
    Get full text
    Monograph
  14. 14
  15. 15

    Non-probabilistic approach to cooperative position tracking in large swarm of simple mobile robots using triangular cross-observation by Din, Abdul Sattar

    Published 2013
    “…In addition to that, this approach comes with the mechanism to validate the integrity of the observation data prior to the update process. The performance of the algorithm was validated and compared against that of the EKF through series of simulations using Stage multi-agent simulator. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Comparative Performance Analysis of Bat Algorithm and Bacterial Foraging Optimization Algorithm using Standard Benchmark Functions by Mazlina, Abdul Majid, Alsariera, Yazan A., Alamri, Hammoudeh S., Nasser, Abdullah M., Kamal Z., Zamli

    Published 2014
    “…Optimization problem relates to finding the best solution from all feasible solutions. Over the last 30 years, many meta-heuristic algorithms have been developed in the literature including that of Simulated Annealing (SA), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Harmony Search Algorithm (HS) to name a few. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm by Zeni, Saltihie

    Published 2012
    “…This document is a study about LEACH algorithm where the implementation was done using OMNeT++ network simulator to study the performance of this algorithm in term of network lifetime. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Optimisation model for scheduling MapReduce jobs in big data processing / Ibrahim Abaker Targio Hashem by Ibrahim Abaker , Targio Hashem

    Published 2017
    “…The proposed algorithm is evaluated using tasks scheduling in the scheduling load simulator and validated using statistical modeling. …”
    Get full text
    Get full text
    Get full text
    Thesis