Search Results - (( java implication based algorithm ) OR ( using _ calling algorithm ))
Search alternatives:
- implication based »
- calling algorithm »
- java implication »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
2
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
3
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…The expectation maximization algorithm is used to estimate the parameter of the model such that the initial values of the algorithm is determined using the kernel method. …”
Get full text
Get full text
Conference or Workshop Item -
4
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
5
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Secondly, the proposed call admission control algorithm improved the resource utilization algorithm thus reducing the call block, call dropped, call degradation. …”
Get full text
Get full text
Thesis -
6
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
Get full text
Get full text
Thesis -
7
The performance of block decoding using Dorsch algorithm / Husna Abdul Rahman, Ros Shilawani S. Abdul Kadir and Farah Yasmin Abdul Rahman.
Published 2007“…The decoding based on soft bits are referred to as soft decision decoding. The algorithm uses soft decision information to rank the reliability of the received symbols. …”
Get full text
Get full text
Research Reports -
8
An Email to Readable Vietnamese Text Conversion Algorithm for Use in TTS Application
Published 2020“…Therefore, this work presents an email to readable Vietnamese text conversion algorithm for use in TTS application. The average processing time tested on 60 emails is 1.7 milliseconds (ms). …”
Get full text
Get full text
Conference or Workshop Item -
9
Cryptanalysis in cryptographic algorithm design
Published 2006“…Therefore, a cryptographic algorithm has to endure cryptanalysis to ensure that it is safe for private or public use. …”
Get full text
Conference or Workshop Item -
10
Fast zerox algorithm for routing in optical multistage interconnection networks.
Published 2010“…It is shown that using the new iCM, the original ZeroX algorithm is simplified, thus improved the algorithm by reducing the time to complete routing process. …”
Get full text
Get full text
Article -
11
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Subjects:Conference Paper -
12
Enhancement of RSA Key Generation Using Identity
Published 2015“…The purpose of this paper is to enhance previous algorithm called Tripathi algorithm. The Tripathi algorithm proposes an RSA based algorithm to generate cryptographic keys using user identity such as email address of a person. …”
Get full text
Get full text
Get full text
Book Chapter -
13
Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm
Published 2018“…The problem of using range function in Heterogeneous Euclidean-Overlap Metric (HEOM) is addressed by replacing the range with interquartile range function called Interquartile Range-Heterogeneous Metric (IQR-HEOM). …”
Get full text
Get full text
Get full text
Thesis -
14
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…Also, this research involves in developing a machine-learning system and program via genetic algorithm that is capable of performing independent learning capability and optimization for scanning sequence using novel GA operators. …”
Get full text
Get full text
Thesis -
15
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…Then, the Fast Zero (FastZ) algorithm is proposed, which uses a new concept called the symmetric Conflict Matrix (sCM) as a pre-scheduling technique. …”
Get full text
Get full text
Thesis -
16
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept
Published 2024Subjects:Proceedings Paper -
17
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…In this paper, we attempt to use Gaussian mixed model, which is a probabilistic model normally used in speech recognition to identify fraud calls in the telecommunication industry. …”
Get full text
Get full text
Get full text
Article -
18
Real Coded Genetic Algorithm (RCGA): a new RCGA mutator called Scale Truncated Pareto Mutation
Published 2014“…STPM is used with Laplace Crossover (LX) taken from literature to form a new generational RCGA called LX-STPM. …”
Get full text
Get full text
Article -
19
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…To address these problems, this research proposes three new distributed static batch mode inspired algorithms. The first (proposed) algorithm is based on Min-Min, called Min-Diff, the second algorithm is based on Max-Min, called Max-Average, and the third algorithm is to handle the load balancing, called Efficient Load Balancing (ELB). …”
Get full text
Get full text
Get full text
Thesis -
20
A study on advanced statistical analysis for network anomaly detection
Published 2005“…The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
Get full text
Monograph
