Search Results - (( developing _ call algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- call algorithm »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
2
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
3
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…Extended from the FastZ algorithms, another three new algorithms called the FastRLP, BRLP and FastBRLP algorithms are developed to achieve different performance goals. …”
Get full text
Get full text
Thesis -
4
An Email to Readable Vietnamese Text Conversion Algorithm for Use in TTS Application
Published 2020“…However, many of the call centers are operated by human manually. Thus, there is need for developing automatic call center which is powered by artificial intelligence (AI), hence reducing operational costs through automation of calls, answering calls, conducting surveys, and receiving customer feedbacks. …”
Get full text
Get full text
Conference or Workshop Item -
5
Enhance key generation algorithm based user string identity as public key
Published 2015“…In this experiment, an algorithm called the CLB-RSA was developed. Classifications of decimal values to determine whether the E-mail entered contains odd or even numbers were added to this algorithm. …”
Get full text
Get full text
Thesis -
6
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012“…Before this, Sudoku generator has been develop using backtracking algorithm only, but this research use two algorithm which is recursive and backtracking algorithm that called as hybrid algorithm. …”
Get full text
Get full text
Thesis -
7
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Conference Paper -
8
Development of eCall for Malaysia's automotive industries
Published 2019“…As such, collision detection and voice communication algorithm has been designed. For the collision detection, algorithm has been developed based on the data acquired from gyroscope and accelerometer. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Real Coded Genetic Algorithm (RCGA): a new RCGA mutator called Scale Truncated Pareto Mutation
Published 2014“…This paper presents a comparison in the performance analysis between a newly developed mutation operator called Scaled Truncated Pareto Mutation (STPM) and an existing mutation operator called Log Logistic Mutation (LLM). …”
Get full text
Get full text
Article -
10
Attitude Control System for InnoSAT
Published 2009“…To develop attitude control algorithms software; ACS is the part of the ADCS payload. …”
Get full text
Other -
11
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept
Published 2024“…Based on the experiment conducted, a new system call classification to exploit call logs for mobile attacks has been developed using Covering Algorithm. …”
Proceedings Paper -
12
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Secondly, the proposed call admission control algorithm improved the resource utilization algorithm thus reducing the call block, call dropped, call degradation. …”
Get full text
Get full text
Thesis -
13
Development of Simulated Annealing Based Scheduling Algorithm for Two Machines Flow Shop Problem
Published 2015“…It is expected that the developed algorithm will perform well if not a par with Johnson’s algorithm…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
15
Loss reduction in distribution networks using new network reconfiguration algorithm
Published 1996“…For this purpose a simple-to-use formula, called loop loss reduction formula, has been developed. …”
Get full text
Article -
16
Path planning for unmanned aerial vehicles using visibility line-based methods
Published 2011“…The proposed 2D path planning algorithms, on the contrary, select a relatively smaller number of vertices using the so-called base line (BL), thus they are computationally efficient. …”
Get full text
Get full text
Thesis -
17
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
18
A new real coded genetic algorithm crossover: Rayleigh crossover
Published 2014“…This paper presents a comparison in the performance analysis between a newly developed crossover operator called Rayleigh Crossover (RX) and an existing crossover operator called Laplace Crossover (LX). …”
Get full text
Get full text
Get full text
Article -
19
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The performance of the proposed algorithm is also compared to the model developed using the orthogonal least squares (OLS) algorithm. …”
Get full text
Get full text
Article -
20
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The performance of the proposed algorithm is also compared to the model developed using the orthogonal least squares (OLS) algorithm. …”
Get full text
Get full text
Article
