Search Results - (( program input based algorithm ) OR ( java application _ algorithm ))

Refine Results
  1. 1
  2. 2

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli by Seyed Hamidreza , Aghay Kaboli

    Published 2018
    “…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Enhancement of Groundwater-Level Prediction Using an Integrated Machine Learning Model Optimized by Whale Algorithm by Banadkooki F.B., Ehteram M., Ahmed A.N., Teo F.Y., Fai C.M., Afan H.A., Sapitang M., El-Shafie A.

    Published 2023
    “…The results showed that for the first scenario, in which the input data were just the average of the region temperature and three temporal delays of 3, 6, and 9�months were considered, the models based on the three simultaneous temperature inputs with mentioned delays had higher performance as compared to the inputs just belonging to temperature input. …”
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    A novel N-input voting algorithm for X-by-wire fault-tolerant systems by Karimi, Abbas, Zarafshan, Faraneh, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ramli, Abdul Rahman

    Published 2014
    “…These systems include N-modular redundant (NMR) hardware systems and diversely designed software systems based on N-version programming (NVP). Depending on the characteristics of the application and the type of selected voter, the voting algorithms can be implemented for either hardware or software systems. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION by P ISKANDAR, YULITA HANUM

    Published 2006
    “…The heuristic-based predictor provides a platform to utilize the heuristic power of human along with the algorithmic power, geometry accuracy of motion-planning programs and biomechanical laws of human. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Vision-based robot indoor navigation by Teo, Zhin Hang

    Published 2022
    “…This project aims to develop a vision-based navigation robot using OpenCV and C++ programming language in an indoor environment. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    A non-linear programming-based similarity reasoning scheme for modelling of monotonicity-preserving multi-input fuzzy inference systems by Kai, Meng Tay, Tze, Ling Jee, Chee, Peng Lim

    Published 2012
    “…As such, a Non-Linear Programming (NLP)-based SR scheme for constructing a monotonicity-preserving multi-input FIS model is proposed. …”
    Get full text
    Get full text
    Article
  15. 15

    PIC-Based Controller for IGBT Inverter for 3-Phase Motor Drive by SUSETYO, BIANLALA

    Published 2011
    “…The controller, based on Microchip PIC, needs to be programmed with the commutation algorithm and control strategy.…”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Firefly algorithm-based neural network for GCPV system output prediction: article / Nor Syakila Mohd Zainol Abidin by Mohd Zainol Abidin, Nor Syakila

    Published 2014
    “…The performance of the proposed FA-based MLFNN had been compared with the performance of the Classical Evolutionary Programming-based Neural Network (CEP-based MLFNN). …”
    Get full text
    Get full text
    Article
  17. 17

    Design and implementation of real data fast fourier transform processor on field programmable gates array by Ahmed, Mohammed Kassim

    Published 2015
    “…The radix-4 FFT algorithm will be implemented for 64 and 256 points using both 8-bit and 16-bit input width. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Neural network based model predictive control for a steel pickling process by Kittisupakorn, P., Thitiyasook, P., Hussain, Mohd Azlan, Daosud, W.

    Published 2009
    “…The Levenberg-Marquardt algorithm is used to train the process models. In the control (MPC) algorithm, the feedforward neural network models are used to predict the state variables over a prediction horizon within the model predictive control algorithm for searching the optimal control actions via sequential quadratic programming. …”
    Get full text
    Get full text
    Article
  20. 20