Search Results - (( ((based application) OR (its application)) new algorithm ) OR ( web implications _ algorithm ))*

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies by Ahmad, Kamsuriah

    Published 2008
    “…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Sony applicant recruitment system using fuzzy logic / Nik Zurifa Nabilah Zulkifli by Zulkifli, Nik Zurifa Nabilah

    Published 2022
    “…Fuzzy Logic algorithms have adapted to fit a wide range of uses. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    New algorithm for gyroless spacecraft angular rate Estimation and its application by Abdelrahman, Mohammad, Samaan, Malak A.

    Published 2006
    “…A new algorithm for estimating the angular velocity using quaternion measurements is developed based on the concept of the global optimality resulting when using a centralized or master Kalman filter. …”
    Get full text
    Get full text
    Article
  6. 6

    Comprehensive review of the development of the harmony search algorithm and its applications by Al-Omoush, A.A., Alsewari, Abdulrahman A., Alamri, Hammoudeh S., Kamal Z., Zamli

    Published 2019
    “…This paper presents a comprehensive overview of the development of the harmony search (HS) algorithm and its applications. HS is a well-known human-based meta-heuristic algorithm that mimics the process of creating a new harmony in music. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A new vertical edge detection algorithm and its application by Al-Ghaili, Abbas Mohammed Ali, Mashohor, Syamsiah, Ismail, Alyani, Ramli, Abdul Rahman

    Published 2008
    “…The need to distinguish the desired details is a very important pre-process in order to give good results in short time processing. We proposed a new and fast vertical edge detection algorithm (VEDA) which is based on the contrast between the gray scale values. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10

    Fast decryption method for a Rabin primitive-based cryptosystem by Asbullah, Muhammad Asyraf, Kamel Ariffin, Muhammad Rezal

    Published 2014
    “…Hence faster decryption algorithms are sought-after. In this paper we design a fast and efficient algorithm for the decryption of the new cryptosystem based on the Rabin primitive. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Starter Set Generation Based on Factorial Numbers for Half Wing of Butterfly Representation by Karim, Sharmila, Ibrahim, Haslinda

    Published 2021
    “…Previously starter sets are generated by using their permutation under exchange-based and cycling based. However, in the new algorithm, this process is replaced by factorial numbers. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    A modified generalized RBF model with EM-based learning algorithm for medical applications by Ma, Li Ya, Abdul Rahman, Abdul Wahab, Quek, Chai

    Published 2006
    “…Moreover, GRBF trained by the new algorithm has an apparent statistical meaning. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17
  18. 18
  19. 19

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
    Proceedings Paper
  20. 20