Search Results - (( code application optimized algorithm ) OR ( java application a algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Hybrid genetic algorithm for improving fault localization by Mahamad Zakaria, Muhammad Luqman, Sharif, Khaironi Yatim, Abd Ghani, Abdul Azim, Koh, Tieng Wei, Zulzalil, Hazura

    Published 2018
    “…Genetic algorithm (GA) is well known in finding an optimal solution to a problem while local search is capable of removing duplication. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9

    A review of crossover methods and problem representation of genetic algorithm in recent engineering applications by Zainuddin, Farah Ayiesya, Abd Samad, Md Fahmi

    Published 2020
    “…High efficiency of crossover operators enables minimizing the error occurred in engineering application optimization within a short time and cost. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…This application handle execution of anonymous code that could be malicious securely by running the code in an isolate environment. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Recent advances of whale optimization algorithm, its versions and applications by Alyasseri Z.A.A., Ali N.S., Al-Betar M.A., Makhadmeh S.N., Jamil N., Awadallah M.A., Braik M., Mirjalili S.

    Published 2024
    “…One of the SI algorithms is called the whale optimization algorithm (WOA). …”
    Book chapter
  20. 20