Search Results - (( java implication based algorithm ) OR ( new validation study algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji by Muhammad Illyas, Abdul Muhji

    Published 2018
    “…The result obtained in this study show statistically difference in rotation angle between the new and previous study. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…In this study, we evaluated the performance of the enhanced algorithm called dendrite cell algorithm using sensitivity, specificity, false positive rate, and accuracy and validated the result using parametric and non parametric statistical significant tests. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…A new algorithms with different numbers of queues to improve the performance of the Central Processing Unit. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…Whereas, the validation from the real-world of the two datasets showed that the new augmentation algorithm steadily producing lesser iteration number compared to the conventional Simplex, QSM and BLSA algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm by Ariff Nijay, Ramli

    Published 2023
    “…Lastly, a study of the industrial case was performed as a validation of the developed model and algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    New fundamental theory in solving the royalty payment problem / Wan Noor Afifah Wan Ahmad and Suliadi Firdaus Sufahani by Wan Ahmad, Wan Noor Afifah, Sufahani, Suliadi Firdaus

    Published 2020
    “…Therefore, the indirect method was applied by involving new modified shooting method (Sufahani-Ahmad-Newton-Golden-Royalty Algorithm and Sufahani-Ahmad-Powell-Golden-Royalty Algorithm). …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Multi-Objective Search Group Algorithm for engineering design problems by Huy, T.H.B., Nallagownden, P., Truong, K.H., Kannan, R., Vo, D.N., Ho, N.

    Published 2022
    “…This study proposes a new multi-objective version of the Search Group Algorithm (SGA) called the Multi-Objective Search Group Algorithm (MOSGA). …”
    Get full text
    Get full text
    Article
  13. 13

    Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…Evaluation of these algorithms showed that the results are unsatisfactory due to the lower validity and accuracy of these algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…The results of the validation show a complete similarity between each original face and the output from our algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Performance Measurement on Deep Spiking Neural Network (DSNN) Algorithm in Flood Prediction Environment by Roselind, Tei

    Published 2023
    “…In current studies, researchers are exploring new directions by developing hybrid algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A new multiperspective framework for standardization and benchmarking of image dehazing algorithms by Abdulkareem, Karrar Hameed

    Published 2021
    “…Hence, this study proposed a new multi-perspective standardization and benchmarking framework for image dehazing algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    HYBRID WATER CYCLE OPTIMIZATION ALGORITHM WITH SIMULATED ANNEALING FOR SPAM EMAIL DETECTION by GHADA HAMMAD AL-RAWASHDEH

    Published 2022
    “…For the training and validation datasets, cross-validation was performed, and seven datasets were used to evaluate the suggested spam classification…”
    Get full text
    Thesis
  20. 20

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…New benchmarking metrics for detection capabilities, prevention predictability trust and self-healing reliability are introduced as contributions for the IPS and SH system measuring and validation. …”
    Get full text
    Get full text
    Thesis