Search Results - (( software mitigation based algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Natural disaster mitigation system with an IoT based TTGO T-Call V1.3 ESP32 wireless module microcontroller / Muhammad Fareez Asyraf Istas Fahrurrazi by Fahrurrazi, Muhammad Fareez Asyraf Istas

    Published 2024
    “…The prototype system involves input and output components, including sensors, LEDs, buzzers, and an LCD display, with software specifications using Arduino IDE. The methodology entails gathering sensor data, evaluating it with a decision-making algorithm, triggering alarms, activating output devices, and transmitting data to the server via HTTP protocols. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10

    Online harmonic extraction and synchronization algorithm based control for unified power quality conditioner for microgrid systems by Hasan, K., Othman, M.M., Meraj, S.T., Rahman, N.F.A., Noor, S.Z.M., Musirin, I., Abidin, I.Z.

    Published 2022
    “…This manuscript proposes an Adaptive Linear Neural Network (ADALINE) based control for the unified power quality conditioner to protect the critical loads from voltage related power quality problems and mitigate the current related power quality problems produced by nonlinear loads. …”
    Get full text
    Get full text
    Article
  11. 11

    Developing A Prediction Tool To Improve The Shading Efficiency Of The Pedestrian Zones by Khudhayer, Wael A.

    Published 2020
    “…The development of the prediction tool was conducted base on integrating three sequenced algorithms, which are sun position algorithm, shadow length and position algorithm, and expansion limit algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Electricity distribution network for low and medium voltages based on evolutionary approach optimization by Hasan, Ihsan Jabbar

    Published 2015
    “…The test network is generated by fractal based distribution network generation model software tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region by Fanos, Ali Mutar

    Published 2016
    “…In addition, in order to mitigate rockfall hazard, a barrier location was suggested based on less bouncing height and energy. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
    Get full text
    Get full text
    Thesis
  20. 20

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…It allows one single instance of software to serve various clients. Password-based authentication is considered the cheapest and most popular and commonly used methods of computer authentication. …”
    text::Thesis