Search Results - (( developing box path algorithm ) OR ( java application modified algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Repetitive mutations in genetic algorithm for software test data generations by Kadhim, Mohammed Majid

    Published 2022
    “…Genetic Algorithm (GA) has proven to be an important method in generating test data for automatic path coverage testing. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score by Mirza Rizwan, Sajid

    Published 2021
    “…The purpose of this study is two folds such as the development of a statistically valid path model which considered the possible non-linear paths, mediators, and binary endogenous feature of CVDs status. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Design of an intelligent robotic donationbox a case study by Salami, Momoh Jimoh Emiyoka, Aibinu, Abiodun Musa, OAP Kader Mohideen, Safinaz, Mansor, Siti Aisha

    Published 2011
    “…The design and development of an Intelligent Robotic Donation Box (IRDB) system as a typical final year project in Mechatronics engineering is presented in this paper. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4
  5. 5

    Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2025
    “…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Reconfigurable Stewart Platform for Spiral Contours by G. , Satheesh Kumar, T. , Nagarajan

    Published 2011
    “…The results obtained are to be validated for singularity-free path planning and attempt has to be made to estimate the computational efficiency of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  9. 9

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
    Get full text
    Get full text
    Thesis