Search Results - (( based coding ((window algorithm) OR (graph algorithm)) ) OR ( java implication tree algorithm ))

Refine Results
  1. 1
  2. 2

    A biological inspired fuzzy adaptive window median filter (FAWMF) for enhancing DNA signal processing by Ahmad, M., Jung, L.T., Bhuiyan, A.-A.

    Published 2017
    “…The algorithm applied to variety of DNA datasets produced noteworthy discrimination between coding and non-coding regions contrary to fixed window length conventional filters. © 2017 Elsevier B.V.…”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator by Othman, Nor Shuhaida

    Published 2010
    “…The scope of the paper based on optimal path trace back using graph theory. …”
    Get full text
    Get full text
    Student Project
  6. 6
  7. 7

    Regression test case selection & prioritization using dependence graph and genetic algorithm by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2014
    “…The approach is based on optimization of selected test case from dependency analysis of the source codes. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…This paper propose an optimized regression test case selection and prioritization for object-oriented software based on dependence graph model analysis of the source code and optimized the selected test case using Genetic Algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14
  15. 15

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Additionally, IPO_Agent not only produces the same PAC’s output results, but also generates module number and represents these results in another window. Finally,Algorithm_Agent employs the extracted information provided by IPO_Agent to produce the pseudo-code of the given problem and shows it in separate window. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A new domain decomposition FDTD technique for simulating electromagnetic penetration into buildings by Abd-EI-Raouf, Hany Ehsan

    Published 2005
    “…The second technique based on hybridizing the Yee algorithm with the higher order FDTD "M3d24" scheme. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning by Nur Khairani, Kamarudin, Ahmad Firdaus, Zainal Abidin, Azlee, Zabidi, Mohd Faizal, Ab Razak

    Published 2023
    “…To address these shortcoming issues many security experts use different approaches to detect malware based on various static features. However, by considering only the statistical features, the potential semantic information such as the behavioral feature of the code is overlooked. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Predicting energy consumption pattern based on top trending videos YouTube 2021 using machine learning techniques by Ng, Jiun Shen

    Published 2022
    “…Streamlit.io application was chosen as the website to represent the coding. At the end of this project, a formula equation and graph will be thoroughly discussed and analysed for projecting energy consumption patterns based on the most trending videos on YouTube in 2021.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    WIMAX TESTBED by KOH , MINGHAO

    Published 2008
    “…This project also takes the first few steps of hardware implementation by using Real Time Workshop to convert the Simulink model into C codes which run outside MATLAB. In addition, the Double Sliding Window and Schmid! …”
    Get full text
    Get full text
    Final Year Project