Search Results - (( web application ((_ algorithm) OR (bees algorithm)) ) OR ( its detection based algorithm ))

Refine Results
  1. 1

    Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony by Mohd Izuddin Sipluk

    Published 2022
    “…In this project, a comparative evaluation of selected algorithms is done to ascertain their applicability, practicality, and adaptability in a cloud scenario. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Currently, mobile botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. …”
    Proceedings Paper
  3. 3
  4. 4

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…Hashing function implementation have been using in this system as its cryptography algorithm. In authorised data security on client and server research, researcher mainly focused on data intrusions that can occur anytime without users awareness. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. The result of the algorithm performance will be appeared in web application system. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6

    Objects tracking from natural features in mobile augmented reality by Ng, Edmund Giap Weng, Rehman, Ullah Khan, Shahren, Ahmad Zaidi Adruce, Oon, Yin Bee

    Published 2013
    “…The pose matrix from extracted features was calculated by Homography. The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Detection of SQL injection attack using machine learning by Tung, Tean Thong

    Published 2024
    “…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Real time traceability module for halal logistic transportation using GPS and geofence technique by Mohamad, Maizatul Akma

    Published 2016
    “…User will be notified by receiving an email, while the report current and past track can be viewed via web based visualization interface with Google Map as base map. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Fakebuster: fake news detection system using logistic regression technique in machine learning by Mokhtar, Muhammad Syahmi, Jusoh, Yusmadi Yah, Admodisastro, Novia, Che Pa, Noraini, Amruddin, Amru Yusrin

    Published 2019
    “…Fake news can be certainly solved by the aid of artificial intelligence which includes machine learning algorithms. The objective of this project is to propose a fake news detection model using Logistic Regression, to evaluate the performance of Logistic Regression as fake news detection model and to develop a web application that allows entry of a news content or news URL. …”
    Get full text
    Get full text
    Article
  10. 10

    Suspicious activities detection for anti-money laundering using machine learning techniques by Lim, Aun Chir

    Published 2025
    “…XGBoost is selected as the core detection engine due to its superior performance among five supervised machine learning algorithms tested: Random Forest, Naïve Bayes, Support Vector Machine and Artificial Neural Network. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Skin Colour Detection Based On An Adaptive Multi-Thresholding Technique by Mharib, Ahmed M.

    Published 2007
    “…The experiment shows that the suggested algorithm achieves a noticeable performance improvement and offers a robust solution for skin detection under varying illumination. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model by Kareem Thajeel, Isam, Samsudin, Khairulmizam, Hashim, Shaiful Jahari, Hashim, Fazirulhisyam

    Published 2023
    “…Thus, this study attempts to fill the gap by proposing a feature drift-aware algorithm for detecting the evolved XSS attacks. The proposed approach is a dynamic feature selection based on a deep Q-network multi-agent feature selection (DQN-MAFS) framework. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Breast Cancer Diagnosis Using Neuro-CBR Approach by Norlia, Md. Yusof

    Published 2005
    “…In this study, the Neural Network (NN) simulator with backpropagation algorithm was developed to predict the condition of the breast cancer tumor whether it is benign or maligant and Case-Base Reasoning (CBR) engine developed to classify the cancer stages as well as suggesting appropriate treatment to the patient. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Optimized Decision Forest for Website Phishing Detection by Balogun, A.O., Mojeed, H.A., Adewole, K.S., Akintola, A.G., Salihu, S.A., Bajeh, A.O., Jimoh, R.G.

    Published 2021
    “…The development of web and internet technology has resulted in its application in a wide range of services. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition by Mohd. Hasbullah, Omar

    Published 2011
    “…A blind signal detector, which is known as eigenvalue based detection, was found to be the most desired detector for its detection capabilities, time of execution, and zero a-priori knowledge. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20