Search Results - (( based coding learning algorithm ) OR ( java application a algorithm ))
Search alternatives:
- learning algorithm »
- java application »
- coding learning »
- application a »
- based coding »
- a algorithm »
-
1
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…The algorithm requires source codes comparison based on keyword similarity to extract the words that exist in the two related source codes. …”
Get full text
Get full text
Get full text
Article -
2
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
3
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
4
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…Several machine learning techniques based on supervised learning have been applied to classify malware. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…Several machine learning techniques based on supervised learning have been adopted in the classification of malware. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We utilized the enhanced Q-Learning algorithm to compare actions, including context-based actions, to effectively achieve higher code coverage. …”
Get full text
Get full text
Get full text
Thesis -
8
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…Furthermore, the proposed techniques based on the Q-Learning algorithm do not consider context-based actions. …”
Get full text
Get full text
Article -
9
-
10
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
11
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
12
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
13
-
14
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…Most of the algorithms got promising results and classify packets based on DSCP accurately. …”
Get full text
Get full text
Get full text
Article -
15
Why coding? Why now? From coding to computational thinking through computational mathematics problem based learning (CM-PBL)
Published 2019“…To achieve these goals, computational mathematics problem based learning (CM-PBL) instructional strategy is developed to promote an active learning environment for classroom management involving problem solving. …”
Get full text
Get full text
Conference or Workshop Item -
16
Deep learning based emotion recognition for image and video signals: matlab implementation
Published 2021“…This book is carried out to develop an image and video-based emotion recognition model using CNN for automatic feature extraction and classification with Matlab sample codes. …”
Get full text
Get full text
Book -
17
Optimal water supply reservoir operation by leveraging the meta-heuristic Harris Hawks algorithms and opposite based learning technique
Published 2024“…In this study, an attempt via metaheuristic algorithms, namely the Harris Hawks Optimisation (HHO) Algorithm and the Opposite Based Learning of HHO (OBL-HHO) are made to minimise the water deficit as well as mitigate floods at downstream of the Klang Gate Dam (KGD). …”
Article -
18
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…Attackers use code obfuscation to conceal malicious code, making it difficult for conventional systems and machine learning classifiers to detect threats. …”
thesis::doctoral thesis -
19
-
20
