Search Results - (( developing executable modelling algorithm ) OR ( java detection technique algorithm ))
Search alternatives:
- developing executable »
- modelling algorithm »
- java detection »
-
1
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
3
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…Software testing is one of the most critical phases in the software development life cycle model (SDLC), where the quality of a software product is evaluated. …”
Get full text
Get full text
Get full text
Article -
4
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
5
Image clustering comparison of two color segmentation techniques
Published 2010“…We focus on the outlier detection and background subtraction on image. This project proposed a two color segmentation techniques such as K-means and Fuzzy C-means clustering algorithm that are accurately segment the desired images, which have the same color as the pre-selected pixels with background subtraction. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
7
Hybrid genetic algorithm for improving fault localization
Published 2018“…The result of the experiment shows that our technique able to detect multiple faults in various java programs but there is a need for improvement especially in prioritize fault that occurs simultaneously.…”
Get full text
Get full text
Get full text
Article -
8
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
9
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
10
Load-Balancing Models for Scheduling Divisible Load on Large Scale Data Grids
Published 2009“…In addition, the integration of the proposed DLT model with Simulated Annealing (SA) algorithm has been also developed. …”
Get full text
Get full text
Thesis -
11
Modelling of multi-robot system for search and rescue
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
-
13
A discrete event simulation framework for utility accrual scheduling algorithm in uniprocessor environment
Published 2011“…GUS is one of the existing TUF/UA scheduling algorithms that consider the Time/Utility Function (TUF) of the executed tasks in its scheduling decision. …”
Get full text
Get full text
Get full text
Article -
14
Optimisation model for scheduling MapReduce jobs in big data processing / Ibrahim Abaker Targio Hashem
Published 2017“…The proposed algorithm is evaluated using tasks scheduling in the scheduling load simulator and validated using statistical modeling. …”
Get full text
Get full text
Get full text
Thesis -
15
Development of decentralized data fusion algorithm with optimized kalman filter.
Published 2016“…This thesis proposes a data fusion model that facilitates selection of algorithm and recommends selected algorithm to be optimized. …”
Get full text
Get full text
Thesis -
16
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…Thus, the LDPC code encoder model is developed to identify a low complexity encoding algorithm of LDPC code for the DF protocol relay system. …”
Get full text
Get full text
Get full text
Thesis -
17
Software for modelling the static and dynamic flux linkage - current characteristics of A 6/4 SRM
Published 1996“…Program in C language was developed to validate the algorithm provided by Torrey [5,7].…”
Get full text
Get full text
Student Project -
18
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
19
Some metaheuristic algorithms for solving multiple cross-functional team selection problems
Published 2022“…We compared the developed algorithms with the MIQP-CPLEX solver on 500 programming contestants with 37 skills and several randomized distribution datasets. …”
Get full text
Get full text
Article -
20
Development of task distribution algorithm for multi-robot coordination system
Published 2022“…During the development process, the simulation environment is modeled with desired task points, robots, and traffic lanes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
