Search Results - (( develop using ((three algorithm) OR (_ algorithm)) ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- three algorithm »
- develop using »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
2
Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system
Published 2019“…Recent advancement in 3D printing technology has led to the development of projection mask stereolithography 3D printing process. …”
Get full text
Get full text
Research Report -
3
The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment
Published 2016“…Thus, a new algorithm known as infection evolution (IE) was developed in this study. …”
Get full text
Get full text
Thesis -
4
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…In addition, the mentioned block-matching algorithms are the baseline techniques that have been used to further develop all the enhanced or improved algorithms. …”
Get full text
Get full text
Get full text
Book Chapter -
5
Magnetic attitude control options for earth pointing small satellite
Published 2011“…The developed control algorithms are modeled using the MATLAB SIMULINK codes. …”
Get full text
Get full text
Thesis -
6
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
7
Approximate maximum clique algorithm (AMCA): A clever technique for solving the maximum clique problem through near optimal algorithm for minimum vertex cover problem
Published 2018“…The algorithms that were used for experiments are Maximum Degree Greedy (MDG). …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…Additionally, the proposed HFP+CI voltage control algorithm has resulted fastest response time; it is 94% faster than using the Fuzzy-PI voltage control algorithm and 6% faster than using the Crisp-PI voltage control algorithm.Hence, it can be concluded that the proposed algorithms have successfully performed their functions by effectively enhancing the operation of the SAPF.…”
Get full text
Get full text
Thesis -
9
Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA)
Published 2012“…Multi-levels were used in this study with the aim to produce better results for compressing images.The Multi-level Wavelet Transform Algorithm (MWTA) consists of three phases namely, first level compression, second level compressing in the first level, and algorithm validation by compare.Therefore, Vaishnavi method is used to design and develop the prototype model.In this study, the experiment was conducted using different images (RGB). …”
Get full text
Get full text
Get full text
Thesis -
10
Enhanced control algorithms for multilevel inverter-based shunt active power filter
Published 2017“…Finally, mitigation performance of the three-level NPC inverter-based SAPF while using all the proposed control algorithms simultaneously (Set 3) is observed to be the best.…”
Get full text
Get full text
Get full text
Thesis -
11
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…By using the three-dimensional hybrid cube in KSAHC transformation, encryption keys are represented as n × n × n matrix of integer numbers and used in the development of the permutation and substitution of order 4 square matrix. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Path planning for unmanned aerial vehicles using visibility line-based methods
Published 2011“…This thesis concerns the development of path planning algorithms for unmanned aerial vehicles (UAVs) to avoid obstacles in two- (2D) and three-dimensional (3D) urban environments based on the visibility graph (VG) method. …”
Get full text
Get full text
Thesis -
13
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
Get full text
Get full text
Thesis -
14
Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty
Published 2024“…Given the NP-Hard nature of the three models proposed in this thesis, two metaheuristic algorithms have been developed. …”
Get full text
Get full text
Get full text
Thesis -
15
Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage
Published 2010“…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
16
Ensemble dual recursive learning algorithms for identifying flow with leakage
Published 2010“…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
17
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…The algorithm was developed based on three theories of personality traits, namely Myers-Briggs Type Indicator (MBTI), Shape, and Multiple Intelligence (MI). …”
Get full text
Get full text
Get full text
Thesis -
18
Contour generation for mask projection stereolithography 3D printing
Published 2019“…Recent advancement in 3D printing technology has led to the development of projection mask stereolithography 3D printing process. …”
Get full text
Get full text
Thesis -
19
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
Published 2022“…In this study, the proposed DBL and DBLADD algorithm using the Karatsuba method for non-supersingular Koblitz curve over m bits binary field with gcd(2m– 1, 3)=1 that incorporates eight blocks of EN with three temporary variables saved two multiplications or 9.09% in DBL and DBLADD algorithms, in comparison to the recent literature pertaining to EN. …”
Get full text
Get full text
Get full text
Thesis -
20
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017“…Thus, smart protocol algorithm is developed to replace the previous system. …”
Get full text
Get full text
Monograph
