Search Results - (( java _ prevention algorithm ) OR ( knowledge implementation graph algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Optimizing boarding school schedule using graph colouring : case study of Sekolah Menengah Sultan Abdul Halim / Nur Farhana Mohd Asri by Mohd Asri, Nur Farhana

    Published 2021
    “…The result has shown that the Greedy Algorithm has succeeded to produce the lowest minimal color compared to Graph Coloring Algorithm. …”
    Get full text
    Get full text
    Student Project
  2. 2

    Optimizing boarding school schedule using graph coloring: case study of Sekolah Menengah Sultan Abdul Halim / Nur Farhana Mohd Asri by Mohd Asri, Nur Farhana

    Published 2022
    “…The result has shown that the Greedy Algorithm has succeeded to produce the lowest minimal color compared to Graph Coloring Algorithm. …”
    Get full text
    Get full text
    Research Reports
  3. 3

    The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning by Noor, Ubair, Hassan, Raini, Dwi Handayani, Dini Oktarina

    Published 2025
    “…The implemented algorithm to perform such operation was far more efficient, faster and accurate as compared to conventional methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Optimizing schedule of boarding school using vertex and edge coloring approach / Nurhuda Ismail, Siti Sarah Raseli and Nur Farhana Mohd Asri by Ismail, Nurhuda, Raseli, Siti Sarah, Mohd Asri, Nur Farhana

    Published 2021
    “…Greedy Algorithm has been used to solve the Vertex Coloring approach while Graph Coloring Algorithm has been used to solve the Edge Coloring approach. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A case study on quality of sleep and health using Bayesian networks by Hong , Choon Ong, Chiew , Seng Lee, Chye , Ching Sia

    Published 2012
    “…There are several phases involved including implementation of the learning algorithms, integration of prior knowledge through the whitelist argument and arc setting to form directed acyclic graphs. …”
    Get full text
    Article
  8. 8

    Determining Intermediary Closely Related Languages to Find a Mediator for Intertribal Conflict Resolution by Nasution, A.H., Fitri, S.E., Saian, R., Monika, W., Badruddin, N.

    Published 2022
    “…To address this problem, we aim to find intermediary closely related languages from a language similarity knowledge graph using the best-performing pathfinding algorithms. …”
    Get full text
    Get full text
    Article
  9. 9

    Ontology enrichment with causation relations by Amaal Saleh Hassan, Al Hashimy, Narayanan, Kulathuramaiyer

    Published 2014
    “…Ontology learning is considered a potential approach that can help to reduce the bottleneck of knowledge acquisition. However it suffers from a lack of standards to define concepts, besides the lack of fully automatic knowledge acquisition methods. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Global Mobile Robot Path Planning using Laser Simulator by Ali, Mohammed A. H., Wan Azhar, Wan Yusoff, Zamzuri, Hamedon, Zulkifli, Md. Yusof, Musa, Mailah

    Published 2017
    “…The developed laser simulator is implemented successfully in these environments and the simulation results are compared with the classical A* algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
    Get full text
    Get full text
    Article
  13. 13

    Keyword query processing interface model of ontological natural language manipulation by Hasany, Syed Muhammad Noman

    Published 2010
    “…To handle large keyword queries, graph representation and processing is considered as a bottleneck. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A test case generation framework based on UML statechart diagram by Salman, Yasir Dawood

    Published 2018
    “…The proposed algorithms provide correct results, and the prototype is able to generate test case effectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…It is a code with double shield protection that prevents unauthorized extraction or damaging the remote database in the server side due to malicious SQL injection. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  17. 17

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…While much research has been conducted, focusing on the development of algorithms and techniques for HAR, less emphasis was placed on the improvement of HAR research’s efficiency in terms of sensor data collection, annotation, and storage, resulting in the use of incomplete, inefficient, and time-consuming data engineering systems. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article