Search Results - (( developing learning query algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- validation using »
- java validation »
- using algorithm »
- learning query »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
2
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Finally, the system utilizes a query formulation algorithm (QRYF) to select the structured queries that best interpret user query. …”
Get full text
Get full text
Get full text
Thesis -
3
Penentuan Kerelevanan Dokumen Menggunakan Rangkaian Rambatan Balik
Published 2002“…Hence, this research aims to explore the use of Artificial Intelligence (AI) technique, particularly neural network (NN) in measuring the relevancy of each document compared to the users requests. Backpropagation learning algorithm has been used as a basis for learning in this study. …”
Get full text
Get full text
Get full text
Thesis -
4
Query disambiguation approach using triple-filter
Published 2017“…The proposed triple-filter disambiguation approach inculcates a learning mechanism that continues to automatically learn from user queries and continuously improves its performance capability. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Meta-Heuristic Algorithms for Learning Path Recommender at MOOC
Published 2021“…The learners usually ask the necessary skills that they expect to earn (query). The need is to develop a recommender system that can search for suitable learning paths. …”
Get full text
Get full text
Article -
7
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…TF-IDF Algorithm technique is performed to develop system by calculating the most relevant pages in the textbook based on keyword that entered by user’s query. …”
Get full text
Get full text
Thesis -
8
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
9
Evaluation of arima and ann stream analytics for air quality monitoring system
Published 2021“…The data stored in the query table act as input to the analytics algorithm, which runs in R-server as well. …”
Get full text
Get full text
Thesis -
10
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
11
Face recognition for remote database backup system
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
13
Customer mobile behavioral segmentation and analysis in telecom using machine learning
Published 2021“…This study aims to identify telecom customer segments by utilizing machine learning and subsequently develop a web-based dashboard. …”
Get full text
Get full text
Article -
14
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
16
Content-based indexing of low resolution documents
Published 2016“…A new algorithm that can be used with integrated visual signatures, especially in late fusion query was introduced. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Car dealership web application
Published 2022“…The transfer learning algorithm pre-trained the River adaptive random forest regressor and classifier by transferring the tree structures and weights from the Scikit-learn fitted random forest regressor and classifier, respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
19
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
20
