Search Results - (( developing code detection algorithm ) OR ( java implementation new algorithm ))

Refine Results
  1. 1

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…Based on the analysis, the algorithm of neural network classifier corner detector for FCC was found to have more potentials in terms of accuracy of corner detection and suitability of the chain code. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A study on channel coding for 5G / Xu Wei by Xu , Wei

    Published 2019
    “…This paper focused on Polar code, specifically described the development and principles of Polar code, and studied Polar code schemes for 5G eMBB specification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Object detection system using haar-classifier by Wan Najwa, Wan Ismail

    Published 2009
    “…An algorithm for the design object detection systems is presented. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…To overcome the stated problems, RD code families are used throughout this stage. Secondly, a new detection technique based on spectral direct detection is developed and compared to the reported detection techniques. …”
    Get full text
    Thesis
  11. 11

    Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin by Kamarudin, Muhammad Zarif

    Published 2010
    “…This need to be done due to the fact that further improvement of this project will need the coding history on how the algorithm being developed thus documentation is the common practice in programming stage. …”
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13

    PCB defect detection system using run-length encoding by Zakaria, Muhammad Anif

    Published 2017
    “…Nowadays, electronic devices were widely used for the development of the technology. In PCB manufacturing many defects have been detected. …”
    Get full text
    Get full text
    Student Project
  14. 14

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  15. 15

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  16. 16

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Another limitation is the limited or lack of focus on the removal of XSS vulnerabilities after their detection in the source code. Consequently, an approach called XSS-DETREM has been proposed with the objectives of combining genetic algorithms with static analysis, and a code replacement technique to detect and remove XSS vulnerabilities, respectively, to address the problem of XSS at the source code level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A NOVEL CONSTRUCTION OF VECTOR COMBINATORIAL (VC) CODE FAMILIES AND DETECTION SCHEME FOR SAC OCDMA SYSTEMS by AHMED MOHMED, HASSAN YOUSIF

    Published 2010
    “…Secondly, a new detection technique based on exclusive-OR (XOR) logic is developed and compared to the reported detection techniques. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin by Kamarudin, Muhammad Zarif

    Published 2010
    “…This need to be done due to the fact that further improvement of this project will need the coding history on how the algorithm being developed thus documentation is the common practice in programming stage. …”
    Get full text
    Get full text
    Thesis