Search Results - (( program validating site algorithm ) OR ( java application path algorithm ))
Search alternatives:
- java application »
- application path »
- site algorithm »
- path algorithm »
- validating »
-
1
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
Get full text
Get full text
Thesis -
2
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
Get full text
Get full text
Conference or Workshop Item -
3
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
Get full text
Get full text
Conference or Workshop Item -
4
Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State
Published 2022“…The minimum total distances in all four cases are acquired and validated as both the TSP-GA algorithm and the Traveling Salesman Problem-Mixed Integer Linear Programming (TSP-MILP) algorithm produced the same routing pattern. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications
Published 2025“…The proposed method demonstrated a 69.01 % alignment when validated against the weighted sum method. Following site identification, an improved Geographical Information System-driven fuzzy Traveling Salesman Problem-Binary Integer Programming algorithm was proposed to integrate these sites into a reliable ring-based system topology, aiming to achieve a zero-carbon footprint. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
8
Construction Noise Prediction Using Stochastic Deep Learning
Published 2022“…The deep learning model was trained with stochastic data to predict the noise levels emitted from the construction site. The programming algorithm of stochastic modelling was executed in MATLAB, whereas the deep learning model was established by using Python 3.6 programming language in Spyder. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
-
10
Identifying The Ethical Issues In Twitter: A Knowledge Acquisition For Ontology
Published 2024“…Using a simple algorithm in R programming and 43 keywords based on Ibn Khaldun’s thoughts, 1075 public tweets have been extracted from Twitter as a sample of ethical issues. …”
Article -
11
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
Get full text
Get full text
Thesis -
12
Identifying the ethical issues in Twitter: a knowledge acquisition for ontology
Published 2021“…Using a simple algorithm in R programming and 43 keywords based on Ibn Khaldun’s thoughts, 1075 public tweets have been extracted from Twitter as a sample of ethical issues. …”
Get full text
Get full text
Get full text
Article -
13
Reservoir Inflow Forecasting Using Artificial Neural Network and Adaptive Neuro-Fuzzy Inference System Techniques
Published 2007“…The 6 years daily data from 1995-1997 and 2002-2004 were used for training and validation of the models. Cross validation of training and validation data sets was also considered to obtain the best data set. …”
Get full text
Get full text
Thesis -
14
MicroRNA regulation of human choline kinase gene expression
Published 2019“…MiRNAs binding was predicted by several online computer programs that utilize different algorithms. Potential miRNAs were selected for the synthesis of their mimics and transfected into cancer cell lines. …”
Get full text
Get full text
Article -
15
Development of a fuzzy multi-objective mathematical model for hazardous waste location-routing problem
Published 2014“…In this research, a fuzzy multi-objective mixed integer programming location–routing model for the hazardous waste is developed. …”
Get full text
Get full text
Thesis -
16
Prioritizing CD4 count monitoring in response to ART in resource-constrained settings: a retrospective application of prediction-based classification
Published 2012“…Background: Global programs of anti-HIV treatment depend on sustained laboratory capacity to assess treatment initiation thresholds and treatment response over time. …”
Get full text
Get full text
Get full text
Article -
17
Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia
Published 2019“…Data of socio-demographic variables, medical history about dengue, knowledge about dengue fever and its vectors, attitude towards dengue incidence, elimination of dengue vectors and practices to eradicate the dengue infection and vectors was collected using a structured validated bilingual questionnaire. The data collected was used to learn the structure of BN via some known algorithms using R programming language. …”
Get full text
Get full text
Thesis
