Search Results - (( developing interactive module algorithm ) OR ( java detection new algorithm ))
Search alternatives:
- developing interactive »
- interactive module »
- module algorithm »
- java detection »
- detection new »
- new algorithm »
-
1
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
2
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Graphics, audio-visuals and interaction (GAI) based augmented reality (AR) system for symbian and android smartphone
Published 2012“…Color picking algorithm was used to build the interactions module. …”
Get full text
Get full text
Get full text
Thesis -
4
Integrating Interactive Multimedia Objects in Mobile Augmented Reality for Sarawak Tourism
Published 2018“…Whereas, audio and video API for Android platform were used to build multimedia based audio and video module. As for interaction module, technique of color picking algorithm was applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Interactive learning package for artificial neural network (Demonstration Module) / Camellia Mohd Kamal
Published 2004“…Interactive Learning Package for Artificial Neural Network (Demonstration Module) is a learning package that allow the users to learn and enhance the understanding of the ANN subject in more detailed way and apply in the demonstration parts. …”
Get full text
Get full text
Thesis -
6
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
7
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…A well known task is classification that predicts the class of new instances using known features or attributes automatically. …”
Get full text
Get full text
Thesis -
8
Software module clustering based on the fuzzy adaptive teaching learning based optimization algorithm
Published 2019Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
10
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…FD-TMS was comprehensively assessed in a simulation environment utilizing a performance analysis tool constructed on Java. The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
Get full text
Get full text
Article -
11
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Validation was conducted through three experiments involving four Java programs. The results demonstrated high effectiveness, with scores ranging from 93.91% to 99.51% on the scaled weighted average percentage of faults detected (APFD) metric. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Supervisory control and data acquisition system (SCADA) based customized remote terminal unit (RTU) for distribution automation system
Published 2008“…RTU will initiate the transaction with the digital input and output modules. Two proprietary software systems are used are to develop algorithm for the controller and to develop HMI for monitoring and controlling functions for the operator.…”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Towards real-time visual biometric authentication using human face for healthcare telepresence mobile robots
Published 2016“…The modules are developed with different algorithm and tested individually to ensure the stability of the system. …”
Get full text
Get full text
Get full text
Article -
14
Development Of Integrated Monitoring System For Re-Electric Vehicle
Published 2014“…In addition the data was recorded during the driving for research purpose and future references, and the safety aspects are embedded in the controller module. The development of the system and its algorithm is described in this paper. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Wireless data gloves Malay sign language recognition system
Published 2007“…This paper describes the structure and algorithm of the whole Wireless Bluetooth Data Gloves Sign Language Recognition System, which is defined as a Human-Computer Interaction (HCI) system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Classification of hand gestures from EMG signals / Diaa Albitar
Published 2022“…Surface EMG signals are used to detect hand gestures and signal them as input module in developing prosthetics for rehabilitation and human machine interaction. …”
Get full text
Get full text
Thesis -
17
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…The higher the dissimilarity value, the higher the probability of detecting new faults. Previous research has used Jaccard Distance to measure the distance to prioritize test cases with the same priority value. …”
Get full text
Get full text
Get full text
Article -
18
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…For this reason, the task of this paper becomes difficult. In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. …”
Get full text
Get full text
Get full text
Article -
19
An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications.
Published 2020“…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
Get full text
Get full text
Get full text
Article -
20
REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION
Published 2006“…Heuristic algorithm is an important module widely used for humanoid robots and avatars in VR systems. …”
Get full text
Get full text
Thesis
