Search Results - (( data solution learning algorithm ) OR ( java applications system algorithm ))
Search alternatives:
- applications system »
- learning algorithm »
- solution learning »
- java applications »
- system algorithm »
- data solution »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
-
5
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
7
-
8
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
9
-
10
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
11
Evaluation of machine learning algorithms in predicting CO 2 internal corrosion in oil and gas pipelines
Published 2019“…This creates a demand of utilizing machine learning in predicting corrosion occurrence. This paper discusses on the evaluation of machine learning algorithms in predicting CO 2 internal corrosion rate. …”
Get full text
Get full text
Article -
12
Evaluation of machine learning algorithms in predicting CO2 internal corrosion in oil and gas pipelines
Published 2019“…This creates a demand of utilizing machine learning in predicting corrosion occurrence. This paper discusses on the evaluation of machine learning algorithms in predicting CO2 internal corrosion rate. …”
Get full text
Get full text
Article -
13
A new variant of black hole algorithm based on multi population and levy flight for clustering problem
Published 2020“…Black Hole (BH) optimization algorithm has been underlined as a solution for data clustering problems. …”
Get full text
Get full text
Thesis -
14
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
15
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
16
An Intelligent Data-Driven Approach for Electrical Energy Load Management Using Machine Learning Algorithms
Published 2022“…This fusion of data science, artificial intelligence, and electrical energy management has turned out to be the most precise and robust energy management solution. …”
Get full text
Get full text
Get full text
Article -
17
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…On the other hand, existing stream data learning models with limited labelling have many limitations. …”
Get full text
Get full text
Thesis -
18
-
19
Supervised deep learning algorithms for process fault detection and diagnosis under different temporal subsequence length of process data
Published 2025“…Deep learning algorithms were widely used among all the data-driven algorithms. …”
Get full text
Get full text
Get full text
Article -
20
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item
