Search Results - (( ais implementation best algorithm ) OR ( java applications design algorithm ))
Search alternatives:
- implementation best »
- applications design »
- ais implementation »
- java applications »
- design algorithm »
- best algorithm »
-
1
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The main aim of this work is focusing on solving the IT-related challenge lack-of-adequate knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
5
AI recommendation penetration testing tool for SQL injection: linear regression
Published 2025“…Based on this, the research employ a linear regression technique in the AI penetration testing. This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
Get full text
Get full text
Get full text
Article -
6
Processing time estimation in precision machining industry using AI / Lim Say Li
Published 2017“…Levenberg-Marquardt algorithm is used as the training algorithm. The results show that the data best validation performance is 7.1085 at epoch 27. …”
Get full text
Get full text
Thesis -
7
A Systematic Survey on the Research of AI-predictive Models for Wastewater Treatment Processes
Published 2023“…Lastly, can sort out the best AI technique to design predictive models for WWTP. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
Designing and Developing an Intelligent Congkak
Published 2011“…Congkak is the nation's traditional game which could soon be forgotten if no serious attention is given to it, but literature survey has not yet found any research publication that mentioned the use of neural network algorithm (NN) on Congkak. Therefore the project want to try to rectify this issue by trying to develop an Intelligent Congkak System that also implemented NN and try answer research question such as this: “What is the best Congkak evaluation function for training NN for game playing?” …”
Get full text
Get full text
Get full text
Thesis -
10
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
11
-
12
A new technique for maximum load margin estimation and prediction
Published 2023“…In FAIS, various mechanisms techniques of AIS were investigated and intensive comparisons were made in order to obtain the best implementation of AIS for maximum load margin estimation. …”
Article -
13
-
14
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
15
-
16
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The results of this study show that the proposed method which is the combination of Genetic Algorithm, Artificial Immune System (AIS) and local search has produced the desired results. …”
Get full text
Get full text
Thesis -
17
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
18
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item -
19
Artificial intelligence technique in solving nano-process parameter optimization problem / Norlina Mohd Sabri...[et al.]
Published 2017“…The techniques are Genetic Algorithm (GA), Particle Swarm Optimization (PSO) and Gravitational Search Algorithm (GSA). …”
Get full text
Get full text
Get full text
Article -
20
