Search Results - (( developing ((test using) OR (code using)) algorithm ) OR ( java implication _ algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…The development process for this simulation is using programming language of Microsoft Visual C I t 6.0 and the coding creation depends on the algorithm flowchart and the formula pseudocode. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Steganography algorithm to hide secret message inside an image by Ibrahim, Rosziati, Teoh, Suk Kuan

    Published 2011
    “…The proposed algorithm uses binary codes and pixels inside an image. …”
    Get full text
    Get full text
    Article
  7. 7

    Study of optimal EG placement in radial distribution system using real coded genetic algorithm by M. H., Sulaiman, Omar, Aliman

    Published 2011
    “…This method is developed in MATLAB. The IEEE‐69 bus system is utilized as a test case in this study.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Online Programming Judge System (UOJ) by Tran , Quang Trung

    Published 2013
    “…Moreover, the mechanism of test cases generation using PSO algorithm is deeply analyzed. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation is used to convert source code into a program that works the same way but is much harder to read and understand. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of Finite Element Code for Non-Linear Analysis of Interlocking Mortarless Masonry System by Ahmed Al- Wathaf, Ahmed Hasan

    Published 2006
    “…This study aims at investigating numerically the structural response of interlocking masonry system using finite element method. The developed algorithm used in the FE analysis includes appropriate mathematical models to simulate the main features of mortarless masonry system. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Job recruiting system using sorting Algorithm / Adi Asyraf Ayob by Ayob, Adi Asyraf

    Published 2020
    “…The functionality of the prototype was tested using Test Script while the usability testing was performed by collecting response from the system users about the usefulness, ease of use, and satisfaction. …”
    Get full text
    Get full text
    Thesis
  12. 12

    WAVELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS by Chai, Beng Seow

    Published 2007
    “…This project is about the implementation ofWavelet-DCT intra-frame coder for video coding applications. Wavelet-DCT is a novel algorithm that uses Forward Discrete Wavelet Transform (DWT) to compute DCT. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Performance Analysis of Hexagon-Diamond Search Algorithm for Motion Estimation using MATLAB by Abdul Manap, Redzuan, Ranjit, S.S.S.

    Published 2010
    “…One of ME techniques, known as Block Matching Algorithm (BMA), has been widely used in various video coding standards. …”
    Get full text
    Get full text
    Article
  15. 15

    PCB defect detection system using run-length encoding by Zakaria, Muhammad Anif

    Published 2017
    “…Each of the analysis windows contents the RLE code. Each of the RLE code of the test image will be compared with the RLE code of the original image. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Automatic generation of user-defined test algorithm description file for memory BIST implementation by Hussin, Razaidi, Jidin, Aiman Zakwan, Loh, Wan Ying, Mispan, Mohd Syafiq, Lee, Weng Fook

    Published 2022
    “…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Algorithm analyzer to check the efficiency of codes by Arvaree @ Alvar, Thamilvaani, Atan, Rodziah

    Published 2011
    “…This paper described how software metrics can be used in analyzing efficiency of the developed code in early stage of development. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A new real coded genetic algorithm crossover: Rayleigh crossover by Lim, Siew Mooi, Sulaiman, Md. Nasir, Md Sultan, Abu Bakar, Mustapha, Norwati, Tejo, Bimo Ario

    Published 2014
    “…A set of ten (10) benchmark global optimization test problems is used to investigate the reliability, efficiency, accuracy and quality of solutions of both optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20