Search Results - (( development number using algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Exam hall allocation using genetic algorithm / Norisyani Binti Fauzai by Fauzai, Norisyani

    Published 2021
    “…In this project an automated exam hall allocation prototype was developed using the genetic algorithm since this algorithm is commonly used to produce high-quality optimization solutions. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Statistical selection algorithm for peer-to-peer system by Othman, Mohamed, Kweh, Yeah Lun

    Published 2008
    “…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Development of bacteria foraging optimization algorithm for cell formation in cellular manufacturing system considering cell load variations by Nouri, Hossein, Tang, Sai Hong

    Published 2013
    “…The performance of the proposed algorithm is compared with a number of algorithms that are most commonly used and reported in the corresponding scientific literature such as K-means clustering, the C-link clustering and genetic algorithm using a well-known performance measure that combined cell load variations and a number of exceptional elements. …”
    Get full text
    Get full text
    Article
  6. 6

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Octane number prediction for gasoline blends using convolution neural network / Zhu Yue by Zhu , Yue

    Published 2021
    “…In the project three commonly use algorithm are used for prediction of octane number for gasoline blends, which describes the behavior of the fuel in the engine at lower temperatures and speeds, and is an attemp to simulate acceleration behavior.These tree algorithm are back propagation (BP), radial basis funtion (RBF) and Extreme learning machine (ELM) algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…Clustering technique is able to find hidden patterns and to extract useful information from huge data. Among the techniques, the k-means algorithm is the most commonly used technique for determining optimal number of clusters (k). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Predicting breast cancer using ant colony optimisation / Siti Sarah Aqilah Che Ani by Che Ani, Siti Sarah Aqilah

    Published 2021
    “…Since the lowest rules number and condition numbers is produced by the Ant Colony Optimization, this study concludes that it is the most suitable algorithm in developing the classification model for predicting breast cancer cells.…”
    Get full text
    Get full text
    Student Project
  11. 11

    Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification by Mohd Nizom, Ahmad Nabil

    Published 2018
    “…The algorithm may be developed for application in other field that uses greyscale image as well.…”
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13

    Customised fitness function of evolutionary algorithm for optimization of car park space / Ahmad Syahir Ab. Aziz by Ab. Aziz, Ahmad Syahir

    Published 2017
    “…There are six steps of genetic algorithm. The prototype is useful to worker in construction calculate the total number of parking spaces in the future.…”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Path planning for unmanned aerial vehicles using visibility line-based methods by Omar, Rosli

    Published 2011
    “…The proposed 2D path planning algorithms, on the contrary, select a relatively smaller number of vertices using the so-called base line (BL), thus they are computationally efficient. …”
    Get full text
    Get full text
    Thesis
  16. 16

    The implementation of z-numbers in fuzzy clustering algorithm for wellness of chronic kidney disease patients by N. J., Mohd Jamal, Ku Muhammad Naim, Ku Khalif, Mohd Sham, Mohamad

    Published 2019
    “…Consequently, the implementation of z-numbers in fuzzy clustering algorithm is taken into consideration, where it has more authority to describe the knowledge of human being and extensively used in uncertain information development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method by Amusa, Morufu, Bamidele, Oluwade

    Published 2020
    “…This algorithm is generally used to validate identification numbers such as IMEI, debit/credit card numbers, social security numbers, national identification numbers etc. …”
    Get full text
    Get full text
    Journal
  18. 18

    An improved algorithm for channel allocation on direct sequence spread spectrum by Handrizal, M

    Published 2011
    “…Welsh Powell algorithm is an algorithm that tries to solve the graph coloring problem.Dsatur algorithm is an algorithm coloring sorted by building sequence of vertices dynamically.However,these algorithms have its weaknesses in terms of the minimum number of channel required.In this study,channel allocation called Vertex Merge Algorithm (VMA) is proposed with aim to minimize number of required channels.It is based on the logical structure of vertex in order to a coloring the graph.Each vertex on the graph arranged based on decreasing number of degree.The vertex in the first place on the set gives a color,and then this vertex is merged with non-adjacent vertex.This process is repeatedly until all vertices colored.The assignment provides a minimum number of channels required.A series of an experiment was carried out by using one computer.Vertex Merge Algorithm (VMA) simulation is developed under Linux platform.It was carried out in Hypertext Preprocessor (PHP) programming integrated with GNU Image Manupulation Program (GIMP) for open and edit image.The experimental results show that the proposed algorithm work successfully in channel allocation on DSSS with the minimum of channels required.The average percentage reduction in the number of required channels among the VMA, Dsatur algorithm and Welsh Powell algorithm in the simple graph is equivalent to 0.0%. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20