Search Results - (( developing function window algorithm ) OR ( java detection method algorithm ))
Search alternatives:
- developing function »
- window algorithm »
- method algorithm »
- java detection »
-
1
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
4
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
5
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
Get full text
Get full text
Thesis -
7
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
10
Efficient hardware design for palm-dorsa vein image enhancement
Published 2018“…The aim of this thesis is to develop hardware design for palm-dorsa vein image enhancement algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
Application of minimax algorithm in dots and boxes game
Published 2025“…The research process included designing and developing a functional Dots and Boxes game prototype using C# and the Universal Windows Platform (UWP), featuring a user-friendly interface and customizable settings. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Optimized processing of satellite signal via evolutionary search algorithm
Published 2000“…The PRSS algorithm is an adaptive search technique that can learn a high performance knowledge structure in reactive environments that provide information as an objective function. …”
Get full text
Get full text
Article -
13
Optimised Crossover Genetic Algorithms for Combinatorial Optimisation Problems
Published 2010“…This thesis focuses on the development of a new stream of crossover within genetic algorithms, called Optimised Crossover Genetic Algorithm (OCGA) for solving combinatorial optimisation problems, which takes into account the objective function in finding the best ofspring solution among an exponentially large number of potential ofspring. …”
Get full text
Get full text
Thesis -
14
Pseudo Randomized Search Strategy (PRSS*) of the ambiguity function mapping
Published 1998“…A combination between three methods of optimization, global random search and ambiguity function mapping produced an efficient search algorithm what the author called the Pseudo Randomized Search Strategy (PRSS). …”
Get full text
Get full text
Article -
15
-
16
Genetic algorithm for event scheduling system
Published 2010“…There are four main interfaces that ask for login information, add, edit and view events details. As for the development environment, UTeM-EAS is developed and to run in windows XP with support of Adobe Dreamweaver and MS SQL Server. …”
Get full text
Get full text
Get full text
Article -
17
Modeling of Functional Electrical Stimulation (FES): Powered Knee Orthosis (PKO) assisted gait exercise in post-stroke rehabilitation / Adi Izhar Che Ani
Published 2023“…The dynamic model of PKO is developed by developing mathematical equations that connect the torques exerted by the actuator of PKO. …”
Get full text
Get full text
Thesis -
18
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
19
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…In this research, an approach has been proposed that explores the combination of genetic algorithms with static analysis, and a code replacement method to address the problem of XSS at the source code level. …”
Get full text
Get full text
Thesis -
20
Improved Stereo Vision Algorithms For Robot Navigation
Published 2013Get full text
Get full text
Thesis
