Search Results - (( developing _ all algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Enhancement of Ant System Algorithm for Course Timetabling Problem by Djamarus, Djasli

    Published 2009
    “…This research starts with developing an algorithm based on original concept of Ant System Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks by Raja Mohd Auzar, Tengku Dian Shahida

    Published 2009
    “…Lastly, a comparison is made through simulation between all algorithms developed in this research with previous Zero-based algorithms as well as traditional Heuristic algorithms since equal routing results can be obtained between all algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of Algorithm for QoS Model in Cloud Computing by Alfadli, Mohammed Abdullah, Noordin, Mohamad Fauzan, Billah, Md. Masum

    Published 2021
    “…Then, we simulate them, get the results and discuss results for all algorithms. After that, we will develop our new algorithm for the QoS Model. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhanced control algorithms for multilevel inverter-based shunt active power filter by Hoon, Yap

    Published 2017
    “…SAPF with all the proposed control algorithms is developed and evaluated in MATLAB-Simulink involving various highly nonlinear rectifier loads. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This algorithm achieved 100%, hence, all E-mails considered can be used as public keys.…”
    Get full text
    Get full text
    Thesis
  8. 8

    New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems by Nor Shuhada, Ibrahim

    Published 2024
    “…In the fourth phase, the newly developed algorithm undergoes testing on the formulated ROOPs and compared to several contemporary optimizer algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of coordinating algorithm for rendezvous task of mobile robots by Ng, Jin Siang

    Published 2023
    “…The algorithm ensures that all robots converge to the rendezvous point while avoiding collisions with each other. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Pathfinding algorithms in game development by Rafiq, Abdul, Tuty Asmawaty, Abdul Kadir, Siti Normaziah, Ihsan

    Published 2020
    “…This review paper provides an overview of a pathfinding algorithm for game development which focuses on the algorithms and their contribution to game development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
    Get full text
    Get full text
    Article
  12. 12

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
    Get full text
    Get full text
    Article
  13. 13

    Extracting feature from images by using K-Means clustering algorithm / Abdul Hakim Zainal Abidin by Zainal Abidin, Abdul Hakim

    Published 2016
    “…Methodology of this research consists of Planning and Analysis, Data Collection, Algorithm Design and Development and Testing. All the process in developing the prototype will be reveal later in this report. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm by Tan, Chee Kuan

    Published 2020
    “…In conclusion, this system had been developed with a total period of six months and all of the objectives had been fulfilled. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment by Kok, Kai Yit

    Published 2016
    “…Thus, a new algorithm known as infection evolution (IE) was developed in this study. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of decentralized data fusion algorithm with optimized kalman filter. by Quadri, Sayed Abulhasan

    Published 2016
    “…The proposed QR-FA algorithm is developed by introducing additional step of QR decomposition in the standard factor analysis algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    The development of parameter estimation method for Chinese hamster ovary model using black widow optimization algorithm by Nurul Aimi Munirah, ., Muhammad Akmal, Remli, Noorlin, Mohd Ali, Hui, Wen Nies, Mohd Saberi, Mohamad, Khairul Nizar Syazwan, Wan Salihin Wong

    Published 2020
    “…The proposed algorithm has been compared with the other three famous algorithms, which are Particle Swarm Optimization (PSO), Differential Evolutionary (DE), and Bees Optimization Algorithm (BOA). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    Article
  20. 20

    Letter recognition using backpropagation algorithm by Azrul Hafiz, Awang

    Published 2010
    “…The expected output will be compared with the actual output. Software Development Life Cycle (SDLC) methodology will be used in this project development to make sure all the development process is running smoothly.…”
    Get full text
    Get full text
    Undergraduates Project Papers