Search Results - (( developing a call algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- call algorithm »
- a call »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
2
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…Based on Zero algorithms, a Modified Zero algorithm is developed to achieve a crosstalk-free version of the algorithm. …”
Get full text
Get full text
Thesis -
3
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. …”
Get full text
Get full text
Thesis -
4
Real Coded Genetic Algorithm (RCGA): a new RCGA mutator called Scale Truncated Pareto Mutation
Published 2014“…This paper presents a comparison in the performance analysis between a newly developed mutation operator called Scaled Truncated Pareto Mutation (STPM) and an existing mutation operator called Log Logistic Mutation (LLM). …”
Get full text
Get full text
Article -
5
An Email to Readable Vietnamese Text Conversion Algorithm for Use in TTS Application
Published 2020“…By manually validating the dataset, it is found that the algorithm achieves accuracy of up to 86.67. © 2020 IEEE.…”
Get full text
Get full text
Conference or Workshop Item -
6
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012“…Before this, Sudoku generator has been develop using backtracking algorithm only, but this research use two algorithm which is recursive and backtracking algorithm that called as hybrid algorithm. …”
Get full text
Get full text
Thesis -
7
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Conference Paper -
8
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept
Published 2024“…Based on the experiment conducted, a new system call classification to exploit call logs for mobile attacks has been developed using Covering Algorithm. …”
Proceedings Paper -
9
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Hence, the major problem is developing a scheduling algorithm which creates a trade-off between the system performances. …”
Get full text
Get full text
Thesis -
10
Loss reduction in distribution networks using new network reconfiguration algorithm
Published 1996“…For this purpose a simple-to-use formula, called loop loss reduction formula, has been developed. …”
Get full text
Article -
11
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
12
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
13
Development of eCall for Malaysia's automotive industries
Published 2019“…The eCall prototype has successfully designed and developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…First the effect of different combinations of GA operators on the performance of the model developed is studied. A proposed algorithm called modified GA, or MGA, is presented and a comparison between a simple GA and a modified GA is carried out. …”
Get full text
Get full text
Article -
15
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…First the effect of different combinations of GA operators on the performance of the model developed is studied. A proposed algorithm called modified GA, or MGA, is presented and a comparison between a simple GA and a modified GA is carried out. …”
Get full text
Get full text
Article -
16
Model structure selection for a discrete-time non-linear system using genetic algorithm
Published 2004“…First the effect of different combinations of GA operators on the performance of the model developed is studied. A proposed algorithm called modified GA, or MGA, is presented and a comparison between a simple GA and a modified GA is carried out. …”
Get full text
Get full text
Get full text
Article -
17
Reducing Iteration Using Candidate List
Published 2008“…Their ability as a colony to find paths or routes to the food sources has inspired a newly developed algorithm called Dynamic Ant Colony System 3 Level Updates (DACS3). …”
Get full text
Get full text
Conference or Workshop Item -
18
A new real coded genetic algorithm crossover: Rayleigh crossover
Published 2014“…This paper presents a comparison in the performance analysis between a newly developed crossover operator called Rayleigh Crossover (RX) and an existing crossover operator called Laplace Crossover (LX). …”
Get full text
Get full text
Get full text
Article -
19
Development of Simulated Annealing Based Scheduling Algorithm for Two Machines Flow Shop Problem
Published 2015“…It is expected that the developed algorithm will perform well if not a par with Johnson’s algorithm…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Loss reduction in distribution networks by network reconfiguration: a two stage solution approach
Published 2004“…For this purpose a simple-to-use formula, called loop loss reduction formula has been developed. …”
Get full text
Get full text
Conference or Workshop Item
