Search Results - (( development issues data algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Therefore, it is essential to develop a new technique to authenticate access to database related to web applications and prevent SQL injection vulnerabilities. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Sentiment analysis regarding marital issues using Naive Bayes algorithm / Farah Nabila Mohd Razali by Mohd Razali, Farah Nabila

    Published 2025
    “…The Naive Bayes algorithm was chosen for its efficiency in text classification and ability to handle large volumes of unstructured data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A heuristic approach for finding similarity indexes of multivariate data sets by Khan, Rahim, Zakarya, Muhammad, Khan, Ayaz Ali, Ur Rahman, Izaz, Abd Rahman, Mohd Amiruddin, Abdul Karim, Muhammad Khalis, Mustafa, Mohd Shafie

    Published 2020
    “…In this paper, a non-metric based similarity measure algorithm, for MDSs, is presented that solves the aforementioned issues, particularly, noise and computational time, successfully. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Personality prediction using Random Forest algorithm / Wan Abdul Qayyum Abdul Wahab by Abdul Wahab, Wan Abdul Qayyum

    Published 2023
    “…The research objectives included developing and executing a data gathering strategy, analyzing the data, and assessing the model's performance. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani by Abdul Ghani, Nur Syafiqah

    Published 2021
    “…To achieve the set objectives, this research is conducted through three-phase of research activities which are Data pre-processing, Model Development, and Model Validation. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Development of group method of data handling based on genetic algorithm to predict incipient motion in rigid rectangular storm water channel by Ebtehaj, I., Bonakdari, H., Khoshbin, F., Hin, Ch. Joo Bong, Ab Ghanid, A.

    Published 2017
    “…Also, a sensitivityanalysis is presented to study the performance of each input combination in predictingincipient motion (15) Development of Group Method of Data Handling based on Genetic Algorithm to predict incipient motion in rigid rectangular storm water channel. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions by Abbas O.K., Abdullah F., Radzi N.A.M., Salman A.D., Abdulkadir S.J.

    Published 2025
    “…Many clustered routing algorithms have been developed to address various issues like energy efficiency, network lifetime, and hotspot problems. …”
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Graph-Based Algorithm With Self-Weighted And Adaptive Neighbours Learning For Multi-View Clustering by He, Yanfang

    Published 2024
    “…To address the noise problem in multi-view data, this study enhances the gbs method and develops a new self-weighted graph multi-view clustering algorithm (swmcan). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Ant colony optimization algorithm for rule based classification: Issues and potential by Al-Behadili, Hayder Naser Khraibet, Ku-Mahamud, Ku Ruhana, Sagban, Rafid

    Published 2018
    “…Furthermore, this review can be used as a source of reference to other researchers in developing new ACO algorithms for rule classification.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    The Development of Synthetic Algorithm of Fluid Flow Through Particle Image Velocimetry (PIV) by MOHD SHARFRI, RAIHAN AMALINA

    Published 2017
    “…This report discusses the interrogation performance of a cross-correlation based PIV algorithm with interrogation flexibility. In order to assess the developed algorithm, this procedure is tested with synthetic data for uniform linear flow under various experimental conditions. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Performance of various forecasting algorithms to reduce the number of transmitted packets by sensor node in wireless sensor networks by Husni, Muhammed Ihsan

    Published 2018
    “…(AR-B), Autoregressive all-pole model parameters — Yule-Walker algorithm (AR-YW) and an Efficient Data Collection and Dissemination Algorithm (EDCD1). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…With the advancements of acoustic modem technology that supports better data rates with reliable communications, current research focuses on algorithms those can support such technology in a better way. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…With the advancements of acoustic modem technology that supports better data rates with reliable communications, current research focuses on algorithms those can support such technology in a better way. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map by Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…The goal of this study was to develop a robust image cryptographic scheme based on Latin Square Matrix and Logistics Map, capable of effectively securing sensitive data. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…With the rapid development of the Internet, preserving the security of confidential data has become a challenging issue. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item