Search Results - (( developing function based algorithm ) OR ( java information detection algorithm ))
Search alternatives:
- information detection »
- developing function »
- java information »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
4
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
7
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. …”
Get full text
Get full text
Get full text
Article -
8
Automatic generation of content security policy to mitigate cross site scripting
Published 2016Get full text
Get full text
Conference or Workshop Item -
9
Mobile Vision-based Automatic Counting of Bacteria Colonies
Published 2017Get full text
Get full text
Get full text
Article -
10
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
Published 2019“…The rank-based methods, estimating algorithms, and resampling techniques that are developed do not involve the difficulties of the existing estimating procedures. …”
Get full text
Get full text
Get full text
Thesis -
11
A genetic algorithm based approach for economic dispatch in power system / Mohd Rozely Kalil
Published 1998“…The Genetic Algorithm developed in the project was tested on two objective functions for optimizing the economic dispatch problem, which are the total generation cost and the incremental cost function. …”
Get full text
Get full text
Thesis -
12
-
13
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…In this paper, an efficient computation algorithm for LUC Cryptosystem is developed. It is based on Addition Chain. …”
Get full text
Get full text
Conference or Workshop Item -
14
A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy
Published 2022“…These basic indicators can comprehensively and effectively reflect a country’s or region’s future economic development. The center of radial basis function neural network and smoothing factor to take a uniform distribution of the random radial basis function artificial neural network will be the focus of this study. …”
Get full text
Get full text
Article -
15
A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System
Published 2020“…Finally, surface defects are segmented from an anomaly heat map which is generated based on histogram distance functions. Results show that the proposed algorithm required a learning dataset size as small as 5 samples and was resistant to learning labelling error up to 50%.…”
Get full text
Get full text
Thesis -
16
-
17
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By implementing this function, it enhances the Dijkstra algorithm ability in network analysis. …”
Get full text
Get full text
Get full text
Article -
18
Chebyshev approximation of discrete polynomials and splines
Published 2004“…A total of five algorithms based on the Lagrange polynomials and cubic splines have been developed in this work to identify the extreme points. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Chebyshev approximation of discrete polynomials and splines
Published 2004“…A total of five algorithms based on the Lagrange polynomials and cubic splines have been developed in this work to identify the extreme points. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults
Published 2012“…March tests are developed based on functional fault model (FFM) such as stuck-at faults (SAFs), transition faults (TFs) and coupling faults (CFs). …”
Get full text
Get full text
Thesis
