Search Results - (( developing transformation method algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- developing transformation »
- method algorithm »
- validation using »
- java validation »
- using algorithm »
-
1
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
2
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
3
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
5
Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA)
Published 2012“…This study aims to use Wavelet Transform Algorithm for image compression. Multi-levels were used in this study with the aim to produce better results for compressing images.The Multi-level Wavelet Transform Algorithm (MWTA) consists of three phases namely, first level compression, second level compressing in the first level, and algorithm validation by compare.Therefore, Vaishnavi method is used to design and develop the prototype model.In this study, the experiment was conducted using different images (RGB). …”
Get full text
Get full text
Get full text
Thesis -
6
Semi-automatic oil palm tree counting from pleiades satellite imagery and airborne LiDAR / Nurul Syafiqah Khalid
Published 2020“…Therefore, the final output of tree crown shows the watershed transformation algorithm is the best method for use represented oil palm tree counting in the map which is the accuracy assessment is 38.9%.…”
Get full text
Get full text
Thesis -
7
Evolution of transformer health index in the form of mathematical equation
Published 2017“…Some of the established methods of HI determination such as scoring and ranking method, tier method, matrices and multi-feature assessment model have led to the different interpretations of the final condition of a transformer. …”
Get full text
Get full text
Get full text
Article -
8
Enhancement of Single and Composite Images Based on Contourlet Transform Approach
Published 2009“…The objective evaluation steps show that the new method of enhancement not only superior to the commonly used transformation method (e.g. wavelet transform) but also to various spatial models (e.g. …”
Get full text
Get full text
Thesis -
9
Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform
Published 2014“…Overall, an algorithm showing the combination method of both GA and DCT was successfully developed. …”
Get full text
Get full text
Final Year Project -
10
An improved split-stepwavelet transform method for anomalous radiowave propagation modeling
Published 2014“…A large number of numerical experiments are carried out to validate the performance of the proposed algorithm. Developed algorithm is compared with previously published techniques; Wavelet Galerkin Method (WGM) and Split-Step Fourier transform Method (SSFM). …”
Get full text
Get full text
Article -
11
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
12
COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM
Published 2011“…We started this study by developing a diagnosis system. Five feature extraction methods were developed with curvelet and wavelet coefficients to differentiate between different breast cancer classes. …”
Get full text
Get full text
Thesis -
13
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…Alternatively, patch-matching algorithm was developed in success of the Fourier Transform method when results -were not favorable to it. …”
Get full text
Get full text
Thesis -
14
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…However due to the development of embedded hardware and object detection algorithm, current embedded device may be able to execute the object detection algorithm in real-time. …”
Get full text
Get full text
Conference or Workshop Item -
15
Novel techniques for enhancement and segmentation of acne vulgaris lesions
Published 2013“…Methods: For the first objective, an algorithm is developed based on the theory of high dynamic range (HDR) images. …”
Get full text
Get full text
Get full text
Citation Index Journal -
16
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Fatigue Features Extraction of Road Load Time Data Using the S-Transform
Published 2013“…This paper presents the algorithm development of a new fatigue data editing technique using S-T approach. …”
Get full text
Get full text
Article -
18
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…This paper applied Hilbert-Huang Transform (HHT) as a method to analyse the pressure transient signal. …”
Get full text
Get full text
Article -
19
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…This paper applied Hilbert-Huang Transform (HHT) as a method to analyse the pressure transient signal. …”
Get full text
Get full text
Get full text
Article -
20
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis
