Search Results - (( developing special users algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing special »
- implication based »
- java implication »
- users algorithm »
- special users »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
2
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…It was called MOLAZ. It used two algorithms AES 128 and AES 256 bits, and switching between them using special key (K,). …”
Get full text
Get full text
Get full text
Thesis -
3
A new classification model for online predicting users' future movements
Published 2008“…For this reason some techniques have been developed for predicting user’s future requests. Data manning algorithms can be applied to many prediction problems. …”
Get full text
Get full text
Conference or Workshop Item -
4
Using Image Processing Technique in Packaging Decoration
Published 2009“…The aim of this thesis is to develop an application for packaging decoration purpose that allow user to apply image processing algorithm onto the decoration image and subsequently paste the decoration image on a flat and curve surface in order the decoration image to be viewed at different angles. …”
Get full text
Get full text
Thesis -
5
Physical and computational modeling for finite element analysis
Published 1988“…In the past, the majority of papers relating to F.E analysis were related to the development of new special elements and the computational algorithms for equation or eigenvalue solutions. …”
Get full text
Get full text
Conference or Workshop Item -
6
Ant colony optimization (ACO) algorithm for CNC route problem
Published 2012“…This project is about to develop a software which applying ACO algorithm in order to calculate the shortest path available that can reduce the time taken to drill the entire hole of PCB. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Thus, we proposed a call admission control algorithm that admits users to utilize available resources. …”
Get full text
Get full text
Thesis -
10
Stress mental health symptom assessment mobile application for young adults
Published 2023“…Before this stage, the KNN algorithm is employed to construct the model using Google Form response data as part of the application development process. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Graph-based conflict rectification using stroke gesture approach in timetabling system (CORECTS)
Published 2010“…In this paper, the proposed system, CORECTS, is specially designed and developed to check if conflicts exist within planned timetable. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Agent architectures (building chatterbot) / Umi Aimah Abu Bakar
Published 2003“…There are a few advantages that are crucial to ensure the success of this kind of chatterbot. Most importantly, user can speak Malay with MILAH. MILAH will entertain user as if she's a real person using its very own knowledge and sometimes, MILAH can give surprising answers to users as if it can think. …”
Get full text
Get full text
Thesis -
13
-
14
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…As a result, it can be concluded that this geoid height interpolation android application was successfully developed for providing users with geoid height.…”
Get full text
Get full text
Thesis -
15
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…The system consist of a central database and organized into web page application which can be accessed by system admin, certificate user, and employer. In order to maintain the integrity of the E-Certificate, employers are allowed to verify the certificate in a specially made webpage to authenticate it. …”
Get full text
Get full text
Thesis -
16
DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM
Published 2022“…To contribute to the existing works of driver drowsiness detection systems, this project aims to develop a more useful drowsiness detection algorithm with low complexity and high performance using Python 3.10.1 software. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Hashing function implementation have been using in this system as its cryptography algorithm. In authorised data security on client and server research, researcher mainly focused on data intrusions that can occur anytime without users awareness. …”
Get full text
Get full text
Monograph -
18
Graphical user interface for surface roughness prediction of CNC milling machine / Muhammad Qayyum Nor Asffan
Published 2020“…MATLAB is a programming platform specially designed for engineers. It can function to analyse data, develop algorithms even create models and applications. …”
Get full text
Get full text
Student Project -
19
A web-based image recognition system for detecting harumanis mangoes / Mohamad Shahmil Saari, Romiza Md Nor and Huzaifah A Hamid
Published 2020“…Harumanis mango cultivar is special to Perlis (north state of Malaysia) and has been declared in the national agenda as a special fruit. …”
Get full text
Get full text
Get full text
Article -
20
Framework development in extracting rules from trained neural network / Shuzlina Abdul Rahman, Azlinah Hj Mohamed and Marina Yusoff
Published 2006“…The analysis is derived by excavating literature on RE techniques starting from the year 1993 until 2003 focused on supervised learning algorithm. The framework primarily demonstrates that each approach does not require a special training process for a new input dataset and does not require special network architecture and it can be used as a guideline to ANNs researcher and developer to choose a suitable RE techniques in order for them to perform ANNs' research or developing ANN applications.…”
Get full text
Get full text
Research Reports
