Search Results - (( basic reduction function algorithm ) OR ( java _ prevention algorithm ))
Search alternatives:
- prevention algorithm »
- reduction function »
- function algorithm »
- basic reduction »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
2
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…The contribution is Nonlinear Adaptive Interaction Algorithm (NAIA). The controller is developed based on the enhancement and modification of the basic Adaptive Interaction Algorithm Controller (AIA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
-
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
Get full text
Get full text
Thesis -
5
Fractal coding of bio-metric image for face authentication
Published 2021“…In the encoding, the fractal function converges to its self-similarity as IFS. …”
Get full text
Get full text
Thesis -
6
Message based random variable length key encryption algorithm.
Published 2009“…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
Get full text
Get full text
Article -
7
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…The classification approach basically produces a function that maps data item into one of several predefined classes, by way of inputting training dataset and building a model of the class attribute based on the rest of the attributes.This research undertakes three main tasks. …”
Get full text
Get full text
Thesis -
8
An enhanced minimum variance distortionless response beamformer techniques to reduce interference in array antenna system
Published 2017“…Beamforming (BF) algorithm is one of the major smart antenna function that forming beams towards the direction of the desired user while simultaneously suppressing signals origination from other directions. …”
Get full text
Get full text
Thesis -
9
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…It is a code with double shield protection that prevents unauthorized extraction or damaging the remote database in the server side due to malicious SQL injection. …”
Get full text
Get full text
Get full text
Article -
10
Web Camera Application For Motion Detection
Published 2003“…In the second stage, simulation done on the frame images using Matlab with Image Processing Toolbox as simulation tool to investigate the possibilities of motion detection algorithm on images captured by web camera. In the third stage, implementation process is done by coding the motion detection software using Microsoft Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
11
Efficient beamforming and spectral efficiency maximization in a joint transmission LTE-A system
Published 2016“…Moreover, addressing the lack-of-diversity issue in Basic Particle Swarm Optimization Algorithm (BPSOA) is a primary concern of this work. …”
Get full text
Get full text
Thesis -
12
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…In order to solve this problem, a simulation based “Multi-Colony Global Particle Swarm Optimization (MC-GPSO)” algorithm was developed. This algorithm computes the optimal results of objective functions in a scientific manner. …”
Get full text
Get full text
Get full text
Thesis -
13
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…The extraction network is composed of rough neurons that accounts for the upper and lower approximations and embeds a membership function to replace ordinary activation functions. …”
Get full text
Get full text
Thesis -
14
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
Get full text
Get full text
Monograph -
15
Interval type-2 fuzzy logic control optimize by spiral dynamic algorithm for two-wheeled wheelchair
Published 2020“…Thus, IT2FLC has been proposed as the compatible control strategy for disturbance rejections to overcome uncertainties for enhanced system stability in the upright position. Basically, IT2FLC uses a Type-2 Fuzzy Set (T2FS) and its membership function (MFs) composed of the lower MFs, upper MFs, and footprint of uncertainty (FOU). …”
Get full text
Get full text
Thesis -
16
-
17
Long-term optimal planning for renewable based distributed generators and battery energy storage systems toward enhancement of green energy penetration
Published 2025“…To solve the optimization planning model, a hybrid optimization algorithm is proposed, combining the non-dominating sorting genetic algorithm (NSGAII) and multi-objective particle swarm optimization (MOPSO). …”
Article -
18
Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End
Published 2012“…The application of the proposed algorithm shows significant reduction in the computational effort involved in solving the problem. …”
Get full text
Get full text
Final Year Project -
19
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
20
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
