Search Results - (( user solution learning algorithm ) OR ( java application using algorithm ))
Search alternatives:
- learning algorithm »
- solution learning »
- java application »
- using algorithm »
- user »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The proposed DetectCombined is an innovated technique that execute a protection code based on a sequence of three stages: filtration-validation-history, this technique produces a robust protection code that distinguish between safe SQL commands and malicious ones, and reinforce the memory of detection procedure by saving previous SQL attacks in special tables in the remote database, regardless of the types of users whether a general user of admin. The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
2
Distributed learning based energy-efficient operations in small cell networks
Published 2023“…Simulation results demonstrate improved performance in power consumption, load, sum rate, utility, learning rate, convergence, and energy efficiency for small base stations (SBSs) and user equipment (UEs) compared to four benchmarked algorithms, including WMMSE, game theory, Q-learning, and DRL. …”
Get full text
Get full text
Thesis -
3
Extreme learning machine for user location prediction in mobile environment
Published 2011“…Findings – WiFi’s SS contributes more in accuracy to the prediction of user location than WiFi’s SQ. Moreover, the new framework based on ELM has been compared with the k-Nearest Neighbor and the results have shown that the proposed model based on the extreme learning algorithm outperforms the k-Nearest Neighbor approach. …”
Get full text
Get full text
Get full text
Article -
4
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
5
Extreme learning machine for user location prediction in mobile environment
Published 2011“…Findings – WiFi's SS contributes more in accuracy to the prediction of user location than WiFi's SQ. Moreover, the new framework based on ELM has been compared with the k-Nearest Neighbor and the results have shown that the proposed model based on the extreme learning algorithm outperforms the k-Nearest Neighbor approach. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
User-centric learning for multiple access selections
Published 2019“…The second stage involved utilizing a reinforcement learning algorithm known as q-learning, to learn from feedbacks to identify optimal decision in reaching user-centric requirement goal. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
An energy-efficient spectrum-aware reinforcement learning-based clustering algorithm for cognitive radio sensor networks
Published 2015“…In this paper, we propose a reinforcement learning-based spectrum-aware clustering algorithm that allows a member node to learn the energy and cooperative sensing costs for neighboring clusters to achieve an optimal solution. …”
Get full text
Get full text
Get full text
Article -
10
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
Get full text
Get full text
Thesis -
11
User-centric learning for multiple access selections
Published 2023“…The second stage involved utilizing a reinforcement learning algorithm known as q-learning, to learn from feedbacks to identify optimal decision in reaching user-centric requirement goal. …”
Article -
12
-
13
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
14
A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata
Published 2019“…On the other hand, the existing personalized news recommendation systems do not make an attempt to filter the number of news items to recommend based on the reading rate behavior of a user. Moreover, early researches only consider explicit profile, short-term profile, and long-term profile of a user but none of them use all of the above user profiles in a single solution. …”
Get full text
Get full text
Thesis -
15
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
17
A Multi-Criteria Recommendation Technique for Personalized Tourism Experiences
Published 2025“…The proposed method also provided more relevant recommendations to users compared to all other tested algorithms. Overall, the proposed method offers a novel and effective solution to the information overload challenge in the tourism industry.…”
Get full text
Get full text
Get full text
Thesis -
18
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…Besides reducing the processing overhead it also achieves better results in terms of accuracy compared to the user agent approach. Second, network aware applications architecture for E-Learning system was also proposed to dynamically adjust the users' demand based on network resources. …”
Get full text
Get full text
Thesis -
19
Using the evolutionary mating algorithm for optimizing the user comfort and energy consumption in smart building
Published 2023“…To address the optimization problem, the Evolutionary Mating Algorithm (EMA) is proposed. EMA belongs to the evolutionary computation group of nature-inspired metaheuristic algorithms and offers a promising solution. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article
