Search Results - (( policy implementation graph algorithm ) OR ( java application modified algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1
  2. 2
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Poverty Classification in Indonesia Using BiGRU, BPNN, and Stacking AdaBoost Frameworks by Khalisha, Ariyani, Silvia, Ratna, M., Muflih, Haldi, Budiman, Noor, Azijah, M.Rezqy, Noor Ridha

    Published 2024
    “…These findings underscore the critical role of machine learning in formulating effective policies for poverty alleviation and suggest that integrating multiple machine learning algorithm can significantly enhance decision-making processes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7