Search Results - (( developing users selection algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- selection algorithm »
- learning algorithm »
- developing users »
- java application »
- users selection »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
2
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
-
5
-
6
Channel selection strategies for co-existence between wimax and wifi
Published 2009“…Therefore, channel selection algorithm is developed to select the best operating band which can maximize the total system performances. …”
Get full text
Get full text
Thesis -
7
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
Get full text
Get full text
Thesis -
8
Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm
Published 2020“…This system enables the logistic company to arrange its route to deliver based on the number of trucks selected by the user. This system will first cluster those addresses based on the number of trucks involved and then perform the route optimization algorithm to suggest the shortest route to the user. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
11
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing
Published 2015“…Cloud broke ring is an intermediate negotiator between users and service providers. This negotiator helps users to select appropriate provider as their requests. . …”
Get full text
Get full text
Thesis -
12
Sentiment analysis using clonal selection algorithm for Twitter’s data / Fatimah Mamat
Published 2012“…The sentiment analysis using clonal selection algorithm for twitter’s data system was developed to achieve the main objective which is to classify the twitter’s messages according three sentiments which are positive, negative and neutral. …”
Get full text
Get full text
Thesis -
13
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
14
Secure mobile AES encryptor (SMAE)
Published 2016“…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
15
A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata
Published 2019“…We have proposed a clustering algorithm named Ordered Clustering with a specific characteristic that allows multiple membership in clusters which reflects the news nature and user behavior. …”
Get full text
Get full text
Thesis -
16
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
17
ABC: android botnet classification using feature selection and classification algorithms
Published 2017“…In this paper, a new approach for Android botnet classification based on features selection and classification algorithms is proposed. …”
Get full text
Get full text
Article -
18
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Finally, the system utilizes a query formulation algorithm (QRYF) to select the structured queries that best interpret user query. …”
Get full text
Get full text
Get full text
Thesis -
19
Heritage Threads: Tailored Cultural Expression
Published 2024“…Through in-depth research and analysis of user preferences and garment selection criteria, this study aims to enhance user experiences and satisfaction. …”
Get full text
Get full text
Final Year Project -
20
Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan
Published 2020“…RAD highlights on user interaction and quick development of the system using prototypes. …”
Get full text
Get full text
Thesis
