Search Results - (( developing executive affect algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Therefore, it is essential to develop a new technique to authenticate access to database related to web applications and prevent SQL injection vulnerabilities. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…In this manner, the length of the key would not affect the time execution of this algorithm and digital signature in the end of message would increase the authentication between the sender and the recipient.The main steps in this algorithm started with reading the plain text "original message" from the user. …”
    Get full text
    Get full text
    Thesis
  3. 3

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…In this manner, the length of the key would not affect the time execution of this algorithm and digital signature in the end of message would increase the authentication between the sender and the recipient. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement by Abdul Rahman, Nor Farahaida

    Published 2016
    “…In previous work, an Adaptive Linear Neuron (ADALINE) based extraction algorithm has been developed to generate reference currents. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Auto-feed hyperparameter support vector regression prediction algorithm in handling missing values in oil and gas dataset by Amirruddin, A., Aziz, I.A., Hasan, M.H.

    Published 2020
    “…SVR however is inferior in accuracy and thus this paper discusses the usage of an optimized SVR with Evolved Bat Algorithm (EBA) to handle the missing value accurately with high execution time. …”
    Get full text
    Get full text
    Article
  8. 8

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…LACE algorithm is executed in 1000, 2000, 3000 and 4000 servers to see the performance in Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A population division based multi-task sine cosine algorithm for test redundancy reduction optimization by Kamal Z., Zamli, Kader, Md Abdul, Mekeng, Ambros Magnus Rudolf

    Published 2024
    “…To cater for simultaneous test redundancy reduction from multiple software development projects, a multi-task-based test redundancy reduction algorithm is desirable. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing by Ch'ng, Heng Sun

    Published 2007
    “…It has been shown that the performance of a graph-based shortest path algorithm can severely be affected by the performance of its priority queue. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Weighted subsethood and reasoning based fuzzy time series for moving holiday electricity load demand forecasting by Rosnalini, Mansor

    Published 2021
    “…The modified algorithm, Weighted Subsethood Segmented Fuzzy Time Series (WeSuSFTS) consists of four main phases; data pre-processing, model development, model implementation and model evaluation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    M-Factors Fuzzy Time Series for Forecasting Moving Holiday Electricity Load Demand in Malaysia (S/O 14589) by Mansor, Rosnalini, Mat Kasim, Maznah, Othman, Mahmod, Zaini, Bahtiar Jamili

    “…The modified algorithm, Weighted Subsethood Segmented Fuzzy Time Series (WeSuSFTS) consists of four main phases; data pre-processing, model development, model implementation and model evaluation. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Development of power system analysis software using object components. by Nor, Khaled Mohamed, Mokhlis, H., Suyono, Hadi, Abdel-Akher, M., Abdul Rashid, Abdul Halim, Gani, Taufiq A.

    Published 2007
    “…By using both OOP and CBD methodologies, updating or adding new algorithm can be done to any specific component without affecting other components inside the software. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    A Hybrid Adaptive Leadership GWO Optimization with Category Gradient Boosting on Decision Trees Algorithm for Credit Risk Control Classification by Suihai, Chen, Chih How, Bong, Po Chan, Chiu

    Published 2024
    “…It can effectively enhance the predictive accuracy and execution speed of the CatBoost algorithm model. The third step involves applying the new algorithm to the risk control model for testing and comparison, resulting in the conclusion that the model established by the EBGWO-Catboost algorithm exhibits more advantages compared to models built by other algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Development of power system analysis software using object components by Nor, K.M., Mokhlis, Hazlie, Suyono, H., Abdel-Akher, M., Rashid, A.H.A., Gani, T.A.

    Published 2005
    “…By using both OOP and CBD methodologies, updating or adding new algorithm can be done to any specific component without affecting other components inside the software. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Harmonic Elimination Pulse Width Modulation Using Differential Evolution Technique For Three Phase Voltage Source Inverter by Kamisman, Norazelina

    Published 2018
    “…Performance of the DE algorithm is highly affected by the mutant vector which is generated through a specific mutation process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Completion time driven hyper-heuristic approach for optimisation of scientific workflow scheduling in cloud environment / Ehab Nabiel Mohammad by Ehab Nabiel , Mohammad

    Published 2018
    “…The second stage (i.e. approach development stage) is the development of the proposed CTDHH approach, which includes two main parts, the cost optimisation model of SWFS and the dynamic hyper-heuristic algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis