Search Results - (( developing formative function algorithm ) OR ( java detection new algorithm ))
Search alternatives:
- developing formative »
- function algorithm »
- java detection »
- detection new »
- new algorithm »
-
1
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
2
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
4
Improvement and application of particle swarm optimization algorithm
Published 2025“…When severe actuator faults impede certain robots, functioning wheeled mobile robots (WMRs) adjust their formation to reduce the consequences of the malfunction. …”
Get full text
Get full text
Article -
5
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…A well known task is classification that predicts the class of new instances using known features or attributes automatically. …”
Get full text
Get full text
Thesis -
6
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
7
Development of a mathematical model for the prediction of chip formation instability and its verification by fuzzy logic with genetic algorithm
Published 2010“…In this paper, a new analytical technique is proposed to predict the frequency of chip formation instability as a function of cutting parameters. …”
Get full text
Get full text
Get full text
Article -
8
Agreement options for negotiation on material location decision of housing development
Published 2020“…Decision algorithms are based on the cooperative game theory to develop the agreement options and coalition formation. …”
Get full text
Get full text
Article -
9
Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems
Published 2012“…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
Get full text
Get full text
Thesis -
10
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…Modem is the heart of a SDR system; it functions as an incoming modulation recogniser, multi-format demodulator, outgoing modulation recogniser, and multi-format modulator. …”
Get full text
Get full text
Thesis -
11
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…FD-TMS was comprehensively assessed in a simulation environment utilizing a performance analysis tool constructed on Java. The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
Get full text
Get full text
Article -
12
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Validation was conducted through three experiments involving four Java programs. The results demonstrated high effectiveness, with scores ranging from 93.91% to 99.51% on the scaled weighted average percentage of faults detected (APFD) metric. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Multi-Object Attitude and Rate Tracking for Spacecraft in Formation Flying
Published 2011“…Based on the same approach the relative dynamics and kinematics are augmented to the previous system to represent the overall system process model. The developed controller is applied to spacecraft in formation as a decentralized control algorithm which aims to track absolute and relative attitude and rates simultaneously.The developed controller is applied to a spacecraft formation in a remote sensing mission.The simulations results show the capabilities of the MSDRE to handle the multi-object tracking without any unnecessary control efforts that might lead to actuators saturations or additional control logic to switch between absolute and relative tracking. …”
Get full text
Get full text
Proceeding Paper -
14
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…To validate the generated tool-path, G-codes generated in media package file (MPF) file format and verified through CNC lathe machine. Indeed, the developed algorithm was able to determine the minimum unit production cost of lathe machining part model. …”
Get full text
Get full text
Thesis -
15
Normalized Relational Storage for Extensible Markup Language (XML) Schema
Published 2011“…The algorithm is based on computing a set of minimum covers for all functional dependencies on a universal relation when given XML Functional Dependencies (XFDs) and the schema information. …”
Get full text
Get full text
Journal -
16
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. …”
Get full text
Get full text
Get full text
Article -
17
Graph-Based Algorithm With Self-Weighted And Adaptive Neighbours Learning For Multi-View Clustering
Published 2024“…To address the noise problem in multi-view data, this study enhances the gbs method and develops a new self-weighted graph multi-view clustering algorithm (swmcan). …”
Get full text
Get full text
Thesis -
18
Songs Search Using Human Humming Voice
Published 2007“…The scopes for this project are human humming voice, voice capture in WA V format, songs database, and MIDI file comparing algorithm. …”
Get full text
Get full text
Final Year Project -
19
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…Following this, at the formational level, various local mechanisms are investigated in the context of the biological development of the proposed neural architectures. …”
Get full text
Get full text
Thesis -
20
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…The higher the dissimilarity value, the higher the probability of detecting new faults. Previous research has used Jaccard Distance to measure the distance to prioritize test cases with the same priority value. …”
Get full text
Get full text
Get full text
Article
