Search Results - (( developing relation _ algorithm ) OR ( java implication based algorithm ))*

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Therefore, it is essential to develop a new technique to authenticate access to database related to web applications and prevent SQL injection vulnerabilities. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Screen-related dependency in children: algorithm for referral from primary care in Malaysia by Abdul Hadi, Azwanis, Mohammad Aidid, Edre, Musa, Ramli

    Published 2025
    “…The emergence of screen-related issues in children in recent years and the negative impacts on their development have further intensified the research and movements for their recognition and prevention. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Bats echolocation-inspired algorithms for global optimisation problems by Nafrizuan, Mat Yahya

    Published 2016
    “…The works related to swarm intelligence algorithms include the development of the algorithm itself, its modification and improvisation as well as its application in solving global optimisation problems. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of Simulated Annealing Based Scheduling Algorithm for Two Machines Flow Shop Problem by M., Muziana, Kamal Z., Zamli

    Published 2015
    “…It is expected that the developed algorithm will perform well if not a par with Johnson’s algorithm…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Relative motion guidance, navigation and control for autonomous spacecraft rendezvous by Okasha, Mohamed Elsayed Aly Abd Elaziz, Newman, Brett

    Published 2011
    “…In this paper, the development of guidance, navigation, and control algorithms of an autonomous space rendezvous and docking system are presented. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…In the first experiment, an algorithm called the LB-RSA was developed. A looping process was added to this algorithm in order to produce a new modulo value to make the E-mail entered relative prime to the new modulo value, which helps to produce more E-mail addresses that can be used as public keys. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhanced ontology-based text classification algorithm for structurally organized documents by Oleiwi, Suha Sahib

    Published 2015
    “…This research combines the ontology and text representation for classification by developing five algorithms. The first and second algorithms namely Concept Feature Vector (CFV) and Structure Feature Vector (SFV), create feature vector to represent the document. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Building an Algorithm for Measuring C Programming Assignments Quality by Muhd Zulhafriz Aadel bin Marzuki, Muhd Zulhafriz

    Published 2008
    “…The focuses of this final report is to provide a clear idea on the development of programming assignment’s quality measurement algorithm. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    CTJ: Input-output based relation combinatorial testing strategy using Jaya algorithm by Ng, Yeong Khang

    Published 2019
    “…To overcome the combinatorial optimization problem, Jaya algorithm is proposed to apply in this project since metaheuristic algorithm is fast in optimization and this strategy is named as CTJ. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Energy efficiency of the bitcoin mining hardware and related blockchain technology by Noor Faiqah Izzati, Afandi

    Published 2018
    “…Developers of bitcoin hardware systems and bitcoin miners are the possible users of proposed formula and algorithm.…”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Hand gesture recognition in ASD related motion using YOLOv8 algorithm / Muhammad Afiq Mohd Ali by Mohd Ali, Muhammad Afiq

    Published 2025
    “…Future work should help develop protocols that expand dataset availability and increase the model's accuracy while incorporating some complex AI algorithms to better support these fields in providing clinical and therapeutic applications.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Comprehensive review of the development of the harmony search algorithm and its applications by Al-Omoush, A.A., Alsewari, Abdulrahman A., Alamri, Hammoudeh S., Kamal Z., Zamli

    Published 2019
    “…This paper presents a comprehensive overview of the development of the harmony search (HS) algorithm and its applications. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…The objective of this paper is to introduce a combination of advantages of different algorithm scheme into one learning algorithm. For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Ensemble dual recursive learning algorithms for identifying flow with leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…The objective of this paper is to introduce a combination of advantages of different algorithm scheme into one learning algorithm. For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item