Search Results - (( developing users prevention algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- prevention algorithm »
- implication based »
- developing users »
- users prevention »
- java implication »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
2
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
Review of the machine learning methods in the classification of phishing attack
Published 2019“…There are several algorithms that can be used in the machine learning method to prevent these attacks. …”
Get full text
Get full text
Get full text
Article -
4
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…Most of the existing location cloaking algorithms are only concerned with snapshot user locations and cannot effectively prevent users from location-dependent attacks when user location-contexts are continuously updated. …”
Get full text
Get full text
Get full text
Article -
5
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…Most of the existing location cloaking algorithms are only concerned with snapshot user locations and cannot effectively prevent users from location-dependent attacks when user location-contexts are continuously updated. …”
Get full text
Get full text
Article -
6
CleverSecure ONLINE System
Published 2008“…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
Get full text
Get full text
Final Year Project -
7
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The main objectives for this project are focusing on the development of user interface that can connect with the machine learning build in Microsoft Azure for pump diagnostic purpose. …”
Get full text
Get full text
Monograph -
8
Library reservation system using face detection / Nik Ruslawati Nik Mustapa and Nur Athikah Fatehah Rosli
Published 2022“…The room needs to be reserved beforehand for the user to use. This situation has become a problem for users as the user’s desired room may be occupied by other users. …”
Get full text
Get full text
Get full text
Article -
9
Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network
Published 2016“…Therefore, this paper proposes a novel routing algorithm called efficient and stable routing algorithm based on user mobility and node density (ESRA-MD). …”
Get full text
Get full text
Article -
10
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
Get full text
Get full text
Thesis -
11
A wheelchair sitting posture detection system using pressure sensors
Published 2024“…A graphical-user interface (GUI) based application was developed using the algorithm with the highest accuracy, DT classifier, to illustrate the result of the posture classification to the wheelchair user for any posture correction to be made in case of improper sitting posture detected.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…Next, we developed a Constant Global False Alarm Rate (CGFAR) with Constant Global Detection Rate (CGDR) algorithm to mitigate the Cooperative SS (CSS) requirements. …”
Get full text
Get full text
Thesis -
13
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Stress mental health symptom assessment mobile application for young adults
Published 2023“…Before this stage, the KNN algorithm is employed to construct the model using Google Form response data as part of the application development process. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Clustering the addiction levels of drug users using fuzzy c-mean
Published 2025“…Hence, the rehabilitation associations in Riau province as end-user of this case are aided in identifying the addiction level of drug users in order to ensure the proper therapeutic prevention and curative action…”
Get full text
Get full text
Get full text
Get full text
Article -
16
Suspicious activity trigger system using YOLOv6 convolutional neural network
Published 2023“…If the activity is classified as the suspicious activity, the system will automatically display a trigger message to alert SATS user. The user can therefore take whatever appropriate measure to prevent being a victim. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Encryption Technology on Windows Workstation
Published 2004“…In addition, the objective is to tighten the security of Windows platform by implementing a new way of encrypting users' information to prevent access by unauthorized users. …”
Get full text
Get full text
Final Year Project -
18
Beat: heart monitoring system
Published 2022“…Beat application is a simple, accurate, and low-cost system that uses a smartwatch to detect heart rate and analyze the data on the user's smartphones. Machine learning algorithms were also developed by our team to detect abnormalities in heart rate. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
Monitoring the Quality of Ozone towards the Prevention of Further Global Warming
Published 2013“…The instrument comprises of two main blocks; the data logger and Graphic User Interface (GUI). The data logger uses 16-Bit Microcontroller as the main control board housing data logger algorithm, Solar Tracker algorithm and data storage block. …”
-
20
Deep-learning-based detection of missing road lane markings using YOLOv5 algorithm
Published 2021“…With the recent technological advancement, especially in machine vision and artificial intelligence, automated or semi-automated missing road lane marking detection systems can potentially be developed. In this work, preliminary study of the implementation of one of the latest deep learning algorithms, i.e. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
