Search Results - (( developing special users algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) by Shuwandy, Moceheb Lazam

    Published 2012
    “…It was called MOLAZ. It used two algorithms AES 128 and AES 256 bits, and switching between them using special key (K,). …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A new classification model for online predicting users' future movements by Jalali, Mehrdad, Mustapha, Norwati, Mamat, Ali, Sulaiman, Md. Nasir

    Published 2008
    “…For this reason some techniques have been developed for predicting user’s future requests. Data manning algorithms can be applied to many prediction problems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Using Image Processing Technique in Packaging Decoration by Zhiyuan, Li

    Published 2009
    “…The aim of this thesis is to develop an application for packaging decoration purpose that allow user to apply image processing algorithm onto the decoration image and subsequently paste the decoration image on a flat and curve surface in order the decoration image to be viewed at different angles. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Physical and computational modeling for finite element analysis by Che Muda, Zakaria

    Published 1988
    “…In the past, the majority of papers relating to F.E analysis were related to the development of new special elements and the computational algorithms for equation or eigenvalue solutions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Ant colony optimization (ACO) algorithm for CNC route problem by Wan Nur Farhanah , Wan Zakaria

    Published 2012
    “…This project is about to develop a software which applying ACO algorithm in order to calculate the shortest path available that can reduce the time taken to drill the entire hole of PCB. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad by Abd Rahman, Abdullah Sani, Ahmad, Samsiah

    Published 2022
    “…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…Thus, we proposed a call admission control algorithm that admits users to utilize available resources. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Stress mental health symptom assessment mobile application for young adults by Lee, Chun Hoong

    Published 2023
    “…Before this stage, the KNN algorithm is employed to construct the model using Google Form response data as part of the application development process. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Graph-based conflict rectification using stroke gesture approach in timetabling system (CORECTS) by Yong, Tien Fui, Choo, Wou Onn, Chue, Wen Yeen, Kok, Hui Meian

    Published 2010
    “…In this paper, the proposed system, CORECTS, is specially designed and developed to check if conflicts exist within planned timetable. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Agent architectures (building chatterbot) / Umi Aimah Abu Bakar by Umi Aimah , Abu Bakar

    Published 2003
    “…There are a few advantages that are crucial to ensure the success of this kind of chatterbot. Most importantly, user can speak Malay with MILAH. MILAH will entertain user as if she's a real person using its very own knowledge and sometimes, MILAH can give surprising answers to users as if it can think. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…As a result, it can be concluded that this geoid height interpolation android application was successfully developed for providing users with geoid height.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…The system consist of a central database and organized into web page application which can be accessed by system admin, certificate user, and employer. In order to maintain the integrity of the E-Certificate, employers are allowed to verify the certificate in a specially made webpage to authenticate it. …”
    Get full text
    Get full text
    Thesis
  16. 16

    DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM by YVONNE, PHUA YEE WUN

    Published 2022
    “…To contribute to the existing works of driver drowsiness detection systems, this project aims to develop a more useful drowsiness detection algorithm with low complexity and high performance using Python 3.10.1 software. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  17. 17

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…Hashing function implementation have been using in this system as its cryptography algorithm. In authorised data security on client and server research, researcher mainly focused on data intrusions that can occur anytime without users awareness. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Graphical user interface for surface roughness prediction of CNC milling machine / Muhammad Qayyum Nor Asffan by Nor Asffan, Muhammad Qayyum

    Published 2020
    “…MATLAB is a programming platform specially designed for engineers. It can function to analyse data, develop algorithms even create models and applications. …”
    Get full text
    Get full text
    Student Project
  19. 19

    A web-based image recognition system for detecting harumanis mangoes / Mohamad Shahmil Saari, Romiza Md Nor and Huzaifah A Hamid by Saari, Mohamad Shahmil, Md Nor, Romiza, Huzaifah, A Hamid

    Published 2020
    “…Harumanis mango cultivar is special to Perlis (north state of Malaysia) and has been declared in the national agenda as a special fruit. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Framework development in extracting rules from trained neural network / Shuzlina Abdul Rahman, Azlinah Hj Mohamed and Marina Yusoff by Abdul Rahman, Shuzlina, Mohamed (Hj), Azlinah, Yusoff, Marina

    Published 2006
    “…The analysis is derived by excavating literature on RE techniques starting from the year 1993 until 2003 focused on supervised learning algorithm. The framework primarily demonstrates that each approach does not require a special training process for a new input dataset and does not require special network architecture and it can be used as a guideline to ANNs researcher and developer to choose a suitable RE techniques in order for them to perform ANNs' research or developing ANN applications.…”
    Get full text
    Get full text
    Research Reports