Search Results - (( based coding ((learning algorithm) OR (graph algorithm)) ) OR ( java implication _ algorithm ))
Search alternatives:
- learning algorithm »
- java implication »
- graph algorithm »
- based coding »
-
1
-
2
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
3
Predicting energy consumption pattern based on top trending videos YouTube 2021 using machine learning techniques
Published 2022“…This project is about predicting energy consumption patterns based on trending videos on YouTube 2021 by using machine learning techniques. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
-
5
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
Published 2023“…To address these shortcoming issues many security experts use different approaches to detect malware based on various static features. However, by considering only the statistical features, the potential semantic information such as the behavioral feature of the code is overlooked. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Approximate methods for minimum vertex cover fail to provide optimal results on small graph instances: A review
Published 2018“…The small benchmark graphs will help the researchers to evaluate efficient approximation algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator: article
Published 2010“…The scope of the paper based on optimal path trace back using graph theory. …”
Get full text
Get full text
Article -
8
Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator
Published 2010“…The scope of the paper based on optimal path trace back using graph theory. …”
Get full text
Get full text
Student Project -
9
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…Several machine learning techniques based on supervised learning have been applied to classify malware. …”
Get full text
Get full text
Get full text
Article -
10
Regression test case selection & prioritization using dependence graph and genetic algorithm
Published 2014“…The approach is based on optimization of selected test case from dependency analysis of the source codes. …”
Get full text
Get full text
Article -
11
-
12
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…Several machine learning techniques based on supervised learning have been adopted in the classification of malware. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We utilized the enhanced Q-Learning algorithm to compare actions, including context-based actions, to effectively achieve higher code coverage. …”
Get full text
Get full text
Get full text
Thesis -
14
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…The algorithm requires source codes comparison based on keyword similarity to extract the words that exist in the two related source codes. …”
Get full text
Get full text
Get full text
Article -
15
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…Furthermore, the proposed techniques based on the Q-Learning algorithm do not consider context-based actions. …”
Get full text
Get full text
Article -
16
An effective transmit packet coding with trust-based relay nodes in VANETs
Published 2020“…Here, the trust-based graph optimization is performed using Cuckoo search algorithm to select the secure relay nodes. …”
Get full text
Get full text
Get full text
Article -
17
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…This paper propose an optimized regression test case selection and prioritization for object-oriented software based on dependence graph model analysis of the source code and optimized the selected test case using Genetic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
20
