Search Results - (( learning application using algorithm ) OR ( java validation using algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…Normally, a user takes several months of learning in order to become highly productive in using a specific object-oriented application framework. …”
    Conference paper
  11. 11
  12. 12
  13. 13

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  14. 14
  15. 15

    Algorithm animation for cryptanalysis of caesar and hill ciphers / Sapiee Haji Jamel and Giuseppina Sherry Sayan by Jamel, Shafie, Sayan, Giuseppina Sherry

    Published 2009
    “…This new trend gives an advantage to cryptanalyst since types of algorithm(s) used are no longer a secret. Cryptanalysis steps can be easily explained using algorithm animation that can be easily integrated with any e-learning platform. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    GuitarApprentice: A Mobile Application for Acoustic Guitar Learning using Fast Fourier Transform algorithm by Lau , Jason Kim Wee

    Published 2013
    “…The objective of the project is to create a learning-based mobile application for learning to play an acoustic guitar. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    A modified generalized RBF model with EM-based learning algorithm for medical applications by Ma, Li Ya, Abdul Rahman, Abdul Wahab, Quek, Chai

    Published 2006
    “…An EM-based training algorithm is also introduced, which uses fewer parameters compared to some classical supervised learning methods. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Learning Algorithm effect on Multilayer Feed Forward Artificial Neural Network performance in image coding by Mahmoud, Omer, Anwar, Farhat, Salami, Momoh Jimoh Emiyoka

    Published 2007
    “…One of the essential factors that affect the performance of Artificial Neural Networks is the learning algorithm. The performance of Multilayer Feed Forward Artificial Neural Network performance in image compression using different learning algorithms is examined in this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM) by Shamim, Akhtar

    Published 2024
    “…The scope of this study is tri folded, First, an exhaustive and parametric comparative study on a wide variety of machine learning algorithms is presented to evaluate the performance of machine learning algorithms in energy load prediction. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Modeling time series data using Genetic Algorithm based on Backpropagation Neural network by Haviluddin

    Published 2018
    “…This study showed the task of optimizing the topology structure and the parameter values (e.g., weights) used in the BPNN learning algorithm by using the GA. …”
    Get full text
    Get full text
    Thesis