Search Results - (( java implication based algorithm ) OR ( using a calling algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Fraud detection in telecommunication industry using Gaussian mixed model by Mohd Yusoff, Mohd Izhan, Mohamed, Ibrahim, Abu Bakar, Mohd Rizam

    Published 2013
    “…In this article, we propose a new fraud detection algorithm using Gaussian mixed model (GMM), a probabilistic model successfully used in speech recognition problem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…Secondly, the proposed call admission control algorithm improved the resource utilization algorithm thus reducing the call block, call dropped, call degradation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    The performance of block decoding using Dorsch algorithm / Husna Abdul Rahman, Ros Shilawani S. Abdul Kadir and Farah Yasmin Abdul Rahman. by Abdul Rahman, Husna, S. Abdul Kadir, Ros Shilawani, Abdul Rahman, Farah Yasmin

    Published 2007
    “…The conventional decoding method is hard decision based whereby the message of the demodulator is quantized only to two levels. The demodulator makes a firm decision whether a bit is a 0 or a 1, which are called hard bits. …”
    Get full text
    Get full text
    Research Reports
  8. 8

    Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…Cryptography is a science of protecting information by changing it into unreadable format (encryption) called ciphertext using a key. …”
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms by Koh, Johnny Siaw Paw

    Published 2008
    “…This thesis presents a new approach to optimize the performance of a dual beam optical scanning system in terms of its scanning combinations and speed, using Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Fast zerox algorithm for routing in optical multistage interconnection networks. by T.D. , Shahida, Othman, Mohamed, Abdullah, M. Khazani

    Published 2010
    “…Based on the ZeroX algorithm, a fast and efficient crosstalk-free time- domain algorithm called the Fast ZeroX or shortly FastZ_X algorithm is proposed for solving optical crosstalk problem in optical Omega multistage interconnection networks. …”
    Get full text
    Get full text
    Article
  12. 12

    Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks by Raja Mohd Auzar, Tengku Dian Shahida

    Published 2009
    “…Then, the Fast Zero (FastZ) algorithm is proposed, which uses a new concept called the symmetric Conflict Matrix (sCM) as a pre-scheduling technique. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhancement of RSA Key Generation Using Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman, Mohd Fadhil, Ramle

    Published 2015
    “…This algorithm used user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  14. 14

    Real Coded Genetic Algorithm (RCGA): a new RCGA mutator called Scale Truncated Pareto Mutation by Lim, Siew Mooi, Sulaiman, Md. Nasir, Md. Sultan, Abu Bakar, Mustapha, Norwati, Tejo, Bimo Ario

    Published 2014
    “…STPM is used with Laplace Crossover (LX) taken from literature to form a new generational RCGA called LX-STPM. …”
    Get full text
    Get full text
    Article
  15. 15

    Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept by Madihah Mohd Saudi, Farida Hazwani Mohd Ridzuan, Nurlida Basir, Nur Fatin Nabila Mohd Rafei Heng, Sakinah Ali Pitchay, Ahmad, IN

    Published 2024
    “…Based on the experiment conducted, a new system call classification to exploit call logs for mobile attacks has been developed using Covering Algorithm. …”
    Proceedings Paper
  16. 16

    Improved expectation maximization algorithm for Gaussian mixed model using the kernel method by Mohd Yusoff, Mohd Izhan, Mohamed, Ibrahim, Abu Bakar, Mohd Rizam

    Published 2013
    “…In this paper, we attempt to use Gaussian mixed model, which is a probabilistic model normally used in speech recognition to identify fraud calls in the telecommunication industry. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An Email to Readable Vietnamese Text Conversion Algorithm for Use in TTS Application by Tran, D.C., Son Ha, H., Quach, L.-D., Hassan, M.F.

    Published 2020
    “…By manually validating the dataset, it is found that the algorithm achieves accuracy of up to 86.67. © 2020 IEEE.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
    Get full text
    Monograph
  19. 19

    Batch mode heuristic approaches for efficient task scheduling in grid computing system by Maipan-Uku, Jamilu Yahaya

    Published 2016
    “…We simulate our proposed algorithms using a Java based simulator that is purposedly built for Grid computing simulations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Single-objective and multi-objective optimization algorithms based on sperm fertilization procedure / Hisham Ahmad Theeb Shehadeh by Hisham Ahmad, Theeb Shehadeh

    Published 2018
    “…In SOOA, a novel metaheuristic approach based on a metaphor of a natural fertilization procedure, called “Sperm Swarm Optimization (SSO)” is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis