Search Results - (( developing function window algorithm ) OR ( java detection system algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The experimental results show that the blood vessel detection system has worked well in the ARM platform with the Android OS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Text steganalysis using evolution algorithm approach by Din, Roshidi, Tuan Muda, Tuan Zalizam, Lertkrai, Puriwat, Omar, Mohd Nizam, Amphawan, Angela, Aziz, Fakhrul Anuar

    Published 2012
    “…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Efficient hardware design for palm-dorsa vein image enhancement by Jusoh@Yusoff, Suhaimi Bahisham

    Published 2018
    “…The aim of this thesis is to develop hardware design for palm-dorsa vein image enhancement algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Application of minimax algorithm in dots and boxes game by Tan, Ah Hwa

    Published 2025
    “…The research process included designing and developing a functional Dots and Boxes game prototype using C# and the Universal Windows Platform (UWP), featuring a user-friendly interface and customizable settings. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Optimized processing of satellite signal via evolutionary search algorithm by Hassan, Azmi, Othman, Rusli, Tang, Kieh Ming

    Published 2000
    “…The PRSS algorithm is an adaptive search technique that can learn a high performance knowledge structure in reactive environments that provide information as an objective function. …”
    Get full text
    Get full text
    Article
  13. 13

    Optimised Crossover Genetic Algorithms for Combinatorial Optimisation Problems by Nazif, Habibeh

    Published 2010
    “…This thesis focuses on the development of a new stream of crossover within genetic algorithms, called Optimised Crossover Genetic Algorithm (OCGA) for solving combinatorial optimisation problems, which takes into account the objective function in finding the best ofspring solution among an exponentially large number of potential ofspring. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Pseudo Randomized Search Strategy (PRSS*) of the ambiguity function mapping by Hassan, Azmi

    Published 1998
    “…A combination between three methods of optimization, global random search and ambiguity function mapping produced an efficient search algorithm what the author called the Pseudo Randomized Search Strategy (PRSS). …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Genetic algorithm for event scheduling system by Hasan Basari, Abd Samad, Hussin, Burairah, Jalal, Siti Musliza, Mohd Isa, Nabihah

    Published 2010
    “…There are four main interfaces that ask for login information, add, edit and view events details. As for the development environment, UTeM-EAS is developed and to run in windows XP with support of Adobe Dreamweaver and MS SQL Server. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Modeling of Functional Electrical Stimulation (FES): Powered Knee Orthosis (PKO) assisted gait exercise in post-stroke rehabilitation / Adi Izhar Che Ani by Che Ani, Adi Izhar

    Published 2023
    “…The dynamic model of PKO is developed by developing mathematical equations that connect the torques exerted by the actuator of PKO. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Snake detection system using convolutional neural network / Muhammad Danial Ahmad Tarmizi by Ahmad Tarmizi, Muhammad Danial

    Published 2020
    “…Objectives of this project is to design the flow of the system, developed in Window application and test the functionality of the system and reliability for the predictive model. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
    Get full text
    Get full text
    Thesis