Search Results - (( developing one function algorithm ) OR ( java work detection algorithm ))

Refine Results
  1. 1

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The experimental results show that the blood vessel detection system has worked well in the ARM platform with the Android OS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
    Get full text
    Get full text
    Thesis
  3. 3

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Consequently, the objectives of the research were met and the expected results were achieved. This research work was limited to Java based web applications. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…FD-TMS was comprehensively assessed in a simulation environment utilizing a performance analysis tool constructed on Java. The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
    Get full text
    Get full text
    Article
  6. 6

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…This complexity can be done by designing an algorithm that consists of substitution function and permutation function which provides confusion and diffusion properties. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Computing the autopilot control algorithm using predictive functional control for unstable model by H. A., Kasdirin, J. A., Rossiter

    Published 2009
    “…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…In this thesis also, I developed a new technique to extract the logic programming from radial basis function neural networks. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…This research work has generated an algorithmic effort estimation model for function points measurement. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Development Of Artificial Bee Colony (Abc) Variants And Memetic Optimization Algorithms by Sulaiman, Noorazliza

    Published 2017
    “…One of BIAs, artificial bee colony (ABC) optimization algorithm, has shown excellent performance in many applications compared to other optimization algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Curve Reconstruction By Metaheuristics Algorithms On Cubic Rational Bézier Function by Mohamed, Najihah

    Published 2019
    “…The optimisation technique consists of exact algorithm, and approximate algorithm. The approximate algorithm is a good technique to be highlighted since it is a feasible way to develop an easier, more convenient curve fitting method, that will save great computation, solve a large scale problem and produce a better quality end result. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Estimation of the denitrification in the lower Mississippi Valley by Saleh, Abdul Razak

    Published 2001
    “…The CREAMS denitrification algorithm was modified to account for the high soil moisture conditions by incorporating a water function.The average annual denitrification value simulated by using modified algorithm was higher than the one predicted by CREAMS algorithm.This result is expected because the modified algorithm uses a water function to reflect the degree of soil saturation.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement by Abdul Rahman, Nor Farahaida

    Published 2016
    “…Nevertheless, it has limited function in which it requires a supported conventional synchronization algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Semiparametric inference procedure for the accelarated failure time model with interval-censored data by Karimi, Mostafa

    Published 2019
    “…Also, a one-step iterative algorithm, called expected rank algorithm, is introduced which is more complicated than the estimation-approximation algorithm, but more accurate. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20