Search Results - (( data validating _ algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Automated Validation of Crowdsourced Data by Ibrahim Z., Aris H., Mansur A.

    Published 2023
    “…Algorithms; Automation; Reliability; automated; crowdsourcer; Data validation; valid data; validity; Crowdsourcing…”
    Conference Paper
  3. 3

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon

    Published 2015
    “…An NIRR simulator is deployed and is validated by ensuring the output data closely resemble the output data published by (Abdulrahim et al., 2014). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects by Olanrewaju, Rashidah Funke, Islam, Thouhedul, Khalifa, Othman Omran, Fajingbesi, Fawwaz Eniola

    Published 2018
    “…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Prediction of Machine Failure by Using Machine Learning Algorithm by Fakhrurazi, Nur Amalina

    Published 2019
    “…The columns consist of the variables that record the reading of machine sensor tags. Validation for the model is analyzed by using validation testing data and cross validation. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Cluster validity of the fuzzy C-means algorithm in mammographic image using adaptive cluster & partition entropy indexes / Azwani Aziz by Aziz, Azwani

    Published 2010
    “…This problem can be solved by cluster validity index. Cluster validity index is needed to find the suitable number of cluster, c in any fuzzy clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon, Ahmad, Idawaty

    Published 2016
    “…An NIRR simulator is deployed and is validated by ensuring the output data closely resemble the output data published by [1]. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…This study provides a text extraction algorithm for web text classification. The extraction algorithm consists of three phases namely web page extraction, rule formulation, and algorithm validation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION by Adi, Waskito

    Published 2011
    “…In the query process, accuracy is determined by the number of feature vector elements, data extraction, and similarity measurement algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Optimization of Multilayer Perceptron (MLP) network training algorithms for agrwood oil quality separation / Noratikah Zawani Mahabob ... [et al.] by Mahabob, Noratikah Zawani, Mohd Yusoff, Zakiah, Ismail, Nurlaila, Taib, Mohd Nasir

    Published 2020
    “…The data is divided into three groups with a ratio of 70%: 15%: 15% for training, validation, and testing respectively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…Evaluating a novel or enhanced algorithm is compulsory in data mining studies in order to measure it has superior performance than its previous version. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan by Hamdan, Ezaryf

    Published 2024
    “…Text preprocessing ensures consistent data representation and facilitates validation. The Machine Learning algorithm, comprising Random Forest, Linear Regression, XGBoost, SVM, and Stacking Ensemble, is embedded in the system for job position predictions based on the analysed data. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms by Raheem, Ajiboye Adeleke, Hauwau, Isah-Kebbe, O., Oladele Tinuke

    Published 2014
    “…The clusters formed revealed the capability and drawbacks of each algorithm on the data points.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…Evaluation of these algorithms showed that the results are unsatisfactory due to the lower validity and accuracy of these algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.] by Pusadan, Mohammad Yazdi, Rabbani, Mohammad Abied, Ardiansyah, Rizka, Ngemba, Hajra Rasmita

    Published 2023
    “…The purpose of this study is to apply the K-Means algorithm to perform clustering on COVID-19 data to determine the high spread of the virus in regions in Indonesia based on the frequency of the data. …”
    Get full text
    Get full text
    Book Section