Search Results - (( java application testing algorithm ) OR ( source solution based algorithm ))

Refine Results
  1. 1

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    BRAIN SOURCE LOCALIZATION TECHNIQUE FOR EEG SIGNALS BASED ON ENHANCED MULTIPLE SPARSE PRIORS by MUNSIF, ALI JATOI

    Published 2017
    “…It is an ill-posed problem in nature affected by uncertainty in solution. Different algorithms are proposed for the solution of this ill-posed problem which include minimum norm estimation (MNE), second order Laplacian based low resolution brain electromagnetic tomography (LORETA), standardized LORETA (sLORETA), exact LORETA, subspace based multiple signal classifier (MUSIC), Beamformer and Bayesian framework based multiple source priors (MSP). …”
    Get full text
    Get full text
    Thesis
  4. 4

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  6. 6

    Enhanced cell-based algorithm with dynamic radius in solving capacitated multi-source weber problem by Nurhazwani, Ahmad Razak

    Published 2021
    “…Random selection of facility location in a Cell-based approach may cause infeasible or worse solutions. …”
    Get full text
    Get full text
    Thesis
  7. 7

    EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method by Khosropanah, Pegah

    Published 2018
    “…Although Electroencephalography (EEG)-based source localization (ESL) estimates the EZ more precisely than other techniques but, it is used rarely in surgery centers. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Shortest Path Trajectory System Based on Dijkstra Algorithm by Putri, Indah Pratiwi

    Published 2012
    “…In the master project, the researcher discussed the shortest path solution to a single source problem based on Dijkstra algorithm as resolving the basic concepts. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Estimation-based Metaheuristics: A New Branch of Computational Intelligence by Nor Hidayati, Abd Aziz, Zuwairie, Ibrahim, Saifudin, Razali, Nor Azlina, Ab. Aziz

    Published 2016
    “…In this paper, a new branch of computational intelligence named estimation-based metaheuristic is introduced. Metaheuristic algorithms can be classified based on their source of inspiration. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A hybrid algorithm of source localization based on hyperbolic technique in WSN by Kabir, H., Kanesan, J., Reza, A.W., Ramiah, H.

    Published 2014
    “…In this paper, a hybrid method combined with maximum likelihood (ML) and genetic algorithm (GA) are proposed to determine the instantaneous position of the moving source by estimating the position and velocity based on hyperbolic techniques (TDOA and FDOA). …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    A refined self-tuning filter-based instantaneous power theory algorithm for indirect current controlled three-level inverter-based shunt active power filter under non-sinusoidal so... by Yap, Hoon, Mohd Radzi, Mohd Amran, Hassan, Mohd Khair, Mailah, Nashiren Farzilah

    Published 2017
    “…In this paper, a refined reference current generation algorithm based on instantaneous power (pq) theory is proposed, for operation of an indirect current controlled (ICC) three-level neutral-point diode clamped (NPC) inverter-based shunt active power filter (SAPF) under non-sinusoidal source voltage conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Load-Balancing Models for Scheduling Divisible Load on Large Scale Data Grids by Abduh Kaid, Monir Abdullah

    Published 2009
    “…The first stage is to develop new DLT based models for multiple sources scheduling. Closed form solutions for the load allocation are derived. …”
    Get full text
    Get full text
    Thesis