Search Results - (( developing functional forms algorithm ) OR ( java detection modified algorithm ))
Search alternatives:
- developing functional »
- detection modified »
- functional forms »
- forms algorithm »
- java detection »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
2
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Validation was conducted through three experiments involving four Java programs. The results demonstrated high effectiveness, with scores ranging from 93.91% to 99.51% on the scaled weighted average percentage of faults detected (APFD) metric. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…In this thesis also, I developed a new technique to extract the logic programming from radial basis function neural networks. …”
Get full text
Get full text
Thesis -
6
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. Lucas Functions are the special form of second-order linear recurrence relation using a large public integer as modulus. …”
Get full text
Get full text
Conference or Workshop Item -
7
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…An alternative approach to training neural network-based equalizers is to use metaheuristic algorithms. Here, in this work, to develop the symmetry-based efficient channel equalization in wireless communication, this paper proposes a modified form of bat algorithm trained with ANN for channel equalization. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System
Published 2020“…This study aims to develop an algorithm for the AOI system to segment and detect surface defects, requiring low processing power and a small number of learning dataset with labelling error resistance. …”
Get full text
Get full text
Thesis -
9
A study on one way hashing function and its application for FTMSK webmail / Noor Hasimah Ibrahim Teo
Published 2005“…One-way hashing function consists of several algorithms. However MD5 is the most common hashing function currently in use. …”
Get full text
Get full text
Thesis -
10
Support directional shifting vector: A direction based machine learning classifier
Published 2021“…The positional error of the linear function has been modelled as a loss function which is iteratively optimized using the gradient descent algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Pashto language stemming algorithm
Published 2015“…To validate the function of the developed algorithm, two native speakers of Pashto were recruited to evaluate the algorithm in terms of its accuracy and strength. …”
Get full text
Get full text
Get full text
Article -
12
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016“…The superior performances of the developed bats echolocation-inspired algorithms are verified through rigorous tests with optimisation benchmark test functions and problems. …”
Get full text
Get full text
Thesis -
13
Application of adaptive bats sonar algorithm to minimise car side impact design
Published 2017“…The best objective function was compared with the existing results of other swarm intelligence algorithms. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
14
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…To validate the generated tool-path, G-codes generated in media package file (MPF) file format and verified through CNC lathe machine. Indeed, the developed algorithm was able to determine the minimum unit production cost of lathe machining part model. …”
Get full text
Get full text
Thesis -
15
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023“…In this work, a new microcontroller board was designed and developed with Genetic Algorithm (GA) embedded on board. …”
Conference paper -
16
-
17
A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud
Published 2007“…Prototypes are developed for both MD5 and SHA1 in one way hashing function using evolutionary approach. …”
Get full text
Get full text
Research Reports -
18
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
19
Computer control of batch process plant (software development)
Published 1995“…The tool developed using the MATLAB Student Edition software provide the capabilities to analysis the system transfer function by using the PIT) controller. …”
Get full text
Get full text
Student Project -
20
