Search Results - (( web application ((_ algorithm) OR (bees algorithm)) ) OR ( its detection based algorithm ))
Search alternatives:
- web application »
- detection based »
- bees algorithm »
- its detection »
-
1
Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony
Published 2022“…In this project, a comparative evaluation of selected algorithms is done to ascertain their applicability, practicality, and adaptability in a cloud scenario. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Currently, mobile botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. …”
Proceedings Paper -
3
-
4
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Hashing function implementation have been using in this system as its cryptography algorithm. In authorised data security on client and server research, researcher mainly focused on data intrusions that can occur anytime without users awareness. …”
Get full text
Get full text
Monograph -
5
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. The result of the algorithm performance will be appeared in web application system. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Objects tracking from natural features in mobile augmented reality
Published 2013“…The pose matrix from extracted features was calculated by Homography. The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
Get full text
Get full text
Get full text
Article -
7
Detection of SQL injection attack using machine learning
Published 2024“…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…User will be notified by receiving an email, while the report current and past track can be viewed via web based visualization interface with Google Map as base map. …”
Get full text
Get full text
Thesis -
9
Fakebuster: fake news detection system using logistic regression technique in machine learning
Published 2019“…Fake news can be certainly solved by the aid of artificial intelligence which includes machine learning algorithms. The objective of this project is to propose a fake news detection model using Logistic Regression, to evaluate the performance of Logistic Regression as fake news detection model and to develop a web application that allows entry of a news content or news URL. …”
Get full text
Get full text
Article -
10
Suspicious activities detection for anti-money laundering using machine learning techniques
Published 2025“…XGBoost is selected as the core detection engine due to its superior performance among five supervised machine learning algorithms tested: Random Forest, Naïve Bayes, Support Vector Machine and Artificial Neural Network. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Skin Colour Detection Based On An Adaptive Multi-Thresholding Technique
Published 2007“…The experiment shows that the suggested algorithm achieves a noticeable performance improvement and offers a robust solution for skin detection under varying illumination. …”
Get full text
Get full text
Thesis -
12
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
Published 2023“…Thus, this study attempts to fill the gap by proposing a feature drift-aware algorithm for detecting the evolved XSS attacks. The proposed approach is a dynamic feature selection based on a deep Q-network multi-agent feature selection (DQN-MAFS) framework. …”
Get full text
Get full text
Get full text
Article -
13
Breast Cancer Diagnosis Using Neuro-CBR Approach
Published 2005“…In this study, the Neural Network (NN) simulator with backpropagation algorithm was developed to predict the condition of the breast cancer tumor whether it is benign or maligant and Case-Base Reasoning (CBR) engine developed to classify the cancer stages as well as suggesting appropriate treatment to the patient. …”
Get full text
Get full text
Get full text
Thesis -
14
Impact of low-dose protocols on computed tomography of lung cancer screening on the intrinsic performance metrics: a phantom study
Published 2023Get full text
Get full text
Conference or Workshop Item -
15
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
16
Optimized Decision Forest for Website Phishing Detection
Published 2021“…The development of web and internet technology has resulted in its application in a wide range of services. …”
Get full text
Get full text
Article -
17
-
18
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…A blind signal detector, which is known as eigenvalue based detection, was found to be the most desired detector for its detection capabilities, time of execution, and zero a-priori knowledge. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
