Search Results - (( java implication based algorithm ) OR ( user selection techniques algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…The selection is based on the user preferences since it uses a self-learning algorithm to determine triggers and handover thresholds dynamically. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems by Abdulhussein, Mohanad Mohammed

    Published 2021
    “…To this end, a fair user clustering algorithm with two stages is proposed, wherein the strong and weak users are selected in the first and second stages, respectively. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Channel selection strategies for co-existence between wimax and wifi by Jong, Siat Ling

    Published 2009
    “…This project study the spectrum co-existence between IEEE 802.16a and 802.11b network in the same un-licensed band using cognitive radio technique. A channel selection algorithm is proposed to improve the secondary user's throughput and avoid interference with primary user. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Distributed learning based energy-efficient operations in small cell networks by Mughees, Amna

    Published 2023
    “…To achieve these goals, a cell selection algorithm is proposed that overcomes the issues of conflicts and load imbalance while reducing energy consumption. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan by Abdul Motok@Mohd Ridzuan, Hafeezur Syakir

    Published 2020
    “…The purpose of this research is to analysed the algorithm techniques and illustrate how the technique solves these problems. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Selection of access network using cost function method in heterogeneous wireless network by Mohamad Tahir, Hatim, Al-Ghushami, Abdullah Hussein, Yahya, Zainor Ridzuan

    Published 2014
    “…This method covers the weight distribution and cost factor techniques.The weight distribution is used to measure different weights for existing wireless network based on the user's preference and mobile terminal power.The cost factor technique is also used to identify the cost for performing handover target by considering every network parameters and its weight.Results obtained showed that the algorithm has the ability to increase user's satisfaction compared to other algorithms, which consistently choose one accessible network.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    OFF-GRID SOLAR PHOTOVOLTAIC (PV) DESIGN BASED ON FUZZY TECHNIQUE FOR ORDER PERFORMANCE BY SIMILARITY TO IDEAL SOLUTION (TOPSIS) APPROACH by NUR AFIQAH, JAHILAN

    Published 2022
    “…The aforementioned technique is the MCDM method, particularly the fuzzy TOPSIS algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification by Hijazi, Musab, Zeki, Akram M., Ismail, Amelia Ritahani

    Published 2023
    “…One of the widely used algorithms for feature selection in text classification is the Evolutionary algorithm . …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    ABC: android botnet classification using feature selection and classification algorithms by Abdullah, Zubaile, Mohd Saudi, Madihah, Anuar, Nor Badrul

    Published 2017
    “…The Information Gain algorithm is used to select the most significant permissions, then the classification algorithms Naïve Bayes, Random Forest and J48 used to classify the Android apps as botnet or benign apps. …”
    Get full text
    Get full text
    Article
  15. 15

    Sentiment analysis using clonal selection algorithm for Twitter’s data / Fatimah Mamat by Mamat, Fatimah

    Published 2012
    “…Clonal selection algorithm was used in this project because there are no researcher are focus on that technique for classify twitter’s data. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Randomized pixel selection for enhancing LSB algorithm security against brute-force attack by Mohamad Afendee, Mohamed, Ammar, Y. Tuama, Mohamad, A. Mohamed, Abdullah, Muhammed, Zurina, M. Hanapi

    Published 2017
    “…However, operating pixels on a sequential basis leaves the algorithm susceptible to many steganalysis techniques. …”
    Get full text
    Get full text
    Article
  17. 17

    Automatic Interpretation Of Magnetic Data Using Euler Deconvolution With Modified Algorithm by Usman, Nuraddeen

    Published 2018
    “…Among these 5 unknowns, the structural index is to be manually selected by the user. The manual input of structural index into the Euler equation makes the technique to be subjective and semi-automated. …”
    Get full text
    Get full text
    Thesis
  18. 18

    User recommendation algorithm in social tagging system based on hybrid user trust by Mustapha, Norwati, Wong, Pei Voon, Sulaiman, Md. Nasir

    Published 2013
    “…The hybrid User Trust method is able to find the most trusted users and selected as neighbours to generate recommendations. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Energy-efficient communications in wireless powered cognitive radio networks based on game theory / Fadhil Mukhlif Aswad Al-Obaidy by Fadhil Mukhlif , Aswad Al-Obaidy

    Published 2020
    “…This work proposes a novel utility function to derive an efficient distributed power algorithm. Moreover, this thesis proposes a pricing technique which guides users to an effective Nash Equilibrium point to encourage users to use network resources efficiently. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…Previous researchers normally select the IMF visually, based on the user’s experience, and introduced a merit index that allows the automatic selection of the IMF. …”
    Get full text
    Get full text
    Thesis