Search Results - (( developing interactive module algorithm ) OR ( java detection new algorithm ))

Refine Results
  1. 1

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  2. 2

    Text steganalysis using evolution algorithm approach by Din, Roshidi, Tuan Muda, Tuan Zalizam, Lertkrai, Puriwat, Omar, Mohd Nizam, Amphawan, Angela, Aziz, Fakhrul Anuar

    Published 2012
    “…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Integrating Interactive Multimedia Objects in Mobile Augmented Reality for Sarawak Tourism by Lee, Angeline, Ng, Edmund Giap Weng, Tan, Kuan Yin., Siti Shukhaila, Shaharuddin, Syaryfah Fazidawaty, Wan Busrah

    Published 2018
    “…Whereas, audio and video API for Android platform were used to build multimedia based audio and video module. As for interaction module, technique of color picking algorithm was applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Interactive learning package for artificial neural network (Demonstration Module) / Camellia Mohd Kamal by Camellia , Mohd Kamal

    Published 2004
    “…Interactive Learning Package for Artificial Neural Network (Demonstration Module) is a learning package that allow the users to learn and enhance the understanding of the ANN subject in more detailed way and apply in the demonstration parts. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…A well known task is classification that predicts the class of new instances using known features or attributes automatically. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…FD-TMS was comprehensively assessed in a simulation environment utilizing a performance analysis tool constructed on Java. The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
    Get full text
    Get full text
    Article
  11. 11

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Validation was conducted through three experiments involving four Java programs. The results demonstrated high effectiveness, with scores ranging from 93.91% to 99.51% on the scaled weighted average percentage of faults detected (APFD) metric. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Supervisory control and data acquisition system (SCADA) based customized remote terminal unit (RTU) for distribution automation system by Musse, Mohamud Ahmed, Soo, Wai Lian

    Published 2008
    “…RTU will initiate the transaction with the digital input and output modules. Two proprietary software systems are used are to develop algorithm for the controller and to develop HMI for monitoring and controlling functions for the operator.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14

    Development Of Integrated Monitoring System For Re-Electric Vehicle by Kasrul, Abdul Karim, Md Nazri , Othman, Auzani , Jidin, Mohd Zulkifli, Ramli

    Published 2014
    “…In addition the data was recorded during the driving for research purpose and future references, and the safety aspects are embedded in the controller module. The development of the system and its algorithm is described in this paper. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Wireless data gloves Malay sign language recognition system by Tan, Tian Swee, Ariff, Ahmad Kamarul, Shaikh Salleh, Sheikh Hussain, Siew, Kean Seng, Leong, Seng Huat

    Published 2007
    “…This paper describes the structure and algorithm of the whole Wireless Bluetooth Data Gloves Sign Language Recognition System, which is defined as a Human-Computer Interaction (HCI) system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Classification of hand gestures from EMG signals / Diaa Albitar by Albitar, Diaa

    Published 2022
    “…Surface EMG signals are used to detect hand gestures and signal them as input module in developing prosthetics for rehabilitation and human machine interaction. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance by Al-Shaibani, Alaa Alrhman Mohammed Raweh, Ahmad, Johanna, Hassan, Rohayanti, Baharom, Salmi, Antari, Dwinta Suci

    Published 2025
    “…The higher the dissimilarity value, the higher the probability of detecting new faults. Previous research has used Jaccard Distance to measure the distance to prioritize test cases with the same priority value. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…For this reason, the task of this paper becomes difficult. In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications. by S. Ahmed, Bestoun, Enoiu, Eduard, Afzal, Wasif, Kamal Z., Zamli

    Published 2020
    “…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION by P ISKANDAR, YULITA HANUM

    Published 2006
    “…Heuristic algorithm is an important module widely used for humanoid robots and avatars in VR systems. …”
    Get full text
    Get full text
    Thesis