Search Results - (( java _ prevention algorithm ) OR ( knowledge implementation graph algorithm ))
Search alternatives:
- knowledge implementation »
- prevention algorithm »
- implementation graph »
- graph algorithm »
-
1
Optimizing boarding school schedule using graph colouring : case study of Sekolah Menengah Sultan Abdul Halim / Nur Farhana Mohd Asri
Published 2021“…The result has shown that the Greedy Algorithm has succeeded to produce the lowest minimal color compared to Graph Coloring Algorithm. …”
Get full text
Get full text
Student Project -
2
Optimizing boarding school schedule using graph coloring: case study of Sekolah Menengah Sultan Abdul Halim / Nur Farhana Mohd Asri
Published 2022“…The result has shown that the Greedy Algorithm has succeeded to produce the lowest minimal color compared to Graph Coloring Algorithm. …”
Get full text
Get full text
Research Reports -
3
The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning
Published 2025“…The implemented algorithm to perform such operation was far more efficient, faster and accurate as compared to conventional methods. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Optimizing schedule of boarding school using vertex and edge coloring approach / Nurhuda Ismail, Siti Sarah Raseli and Nur Farhana Mohd Asri
Published 2021“…Greedy Algorithm has been used to solve the Vertex Coloring approach while Graph Coloring Algorithm has been used to solve the Edge Coloring approach. …”
Get full text
Get full text
Get full text
Article -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
6
Test case minimization applying firefly algorithm
Published 2018Get full text
Get full text
Get full text
Article -
7
A case study on quality of sleep and health using Bayesian networks
Published 2012“…There are several phases involved including implementation of the learning algorithms, integration of prior knowledge through the whitelist argument and arc setting to form directed acyclic graphs. …”
Get full text
Article -
8
Determining Intermediary Closely Related Languages to Find a Mediator for Intertribal Conflict Resolution
Published 2022“…To address this problem, we aim to find intermediary closely related languages from a language similarity knowledge graph using the best-performing pathfinding algorithms. …”
Get full text
Get full text
Article -
9
Ontology enrichment with causation relations
Published 2014“…Ontology learning is considered a potential approach that can help to reduce the bottleneck of knowledge acquisition. However it suffers from a lack of standards to define concepts, besides the lack of fully automatic knowledge acquisition methods. …”
Get full text
Get full text
Get full text
Article -
10
Global Mobile Robot Path Planning using Laser Simulator
Published 2017“…The developed laser simulator is implemented successfully in these environments and the simulation results are compared with the classical A* algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
Get full text
Get full text
Thesis -
12
Message based random variable length key encryption algorithm.
Published 2009“…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
Get full text
Get full text
Article -
13
Keyword query processing interface model of ontological natural language manipulation
Published 2010“…To handle large keyword queries, graph representation and processing is considered as a bottleneck. …”
Get full text
Get full text
Thesis -
14
A test case generation framework based on UML statechart diagram
Published 2018“…The proposed algorithms provide correct results, and the prototype is able to generate test case effectively. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…It is a code with double shield protection that prevents unauthorized extraction or damaging the remote database in the server side due to malicious SQL injection. …”
Get full text
Get full text
Get full text
Article -
16
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
Get full text
Get full text
Monograph -
17
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
18
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Human activity recognition via accelerometer and gyro sensors
Published 2023“…While much research has been conducted, focusing on the development of algorithms and techniques for HAR, less emphasis was placed on the improvement of HAR research’s efficiency in terms of sensor data collection, annotation, and storage, resulting in the use of incomplete, inefficient, and time-consuming data engineering systems. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article
