Search Results - (( developing software detection algorithm ) OR ( java implementation from algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Improved rate of faults detection can give developers chance to debug the faulty software earlier. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…Therefore, the purpose of this thesis is to develop NPSF detection and diagnose software for Static Random Access Memories (SRAM). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Software requirement specification (SRS) document is the most crucial document in software development process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Software User Interface and Algorithm Development for Signal and Noise Characterization by Phoong, Wei Siang

    Published 2015
    “…In my final year project, the purpose of project is reconstruct the I/V converter by using op-amp chip other than LM741 and the algorithm for detect location of photodiode is implement by LabVIEW software. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detection / Nur Asikin Mohd Sayud by Mohd Sayud, Nur Asikin

    Published 2018
    “…In this study, rugosity is been developed by using QPS Fledermaus software. In ArcGlS software, DEM data will be process by using terrain roughness model that has been derived by using Slope Variability algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Implementing a T-Way Test Generation Strategy Using Bees Algorithm by Mohd Hazli, Mohamed Zabil, Kamal Z., Zamli

    Published 2013
    “…In order to ensure software performance as well as software quality, various testing techniques have been used to detect faults as early and as many as possible during the development phase. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Implementing a t-way test generation strategy using bees algorithm by Zabil M.H.M., Zamli K.Z.

    Published 2023
    “…In order to ensure software performance as well as software quality, various testing techniques have been used to detect faults as early and as many as possible during the development phase. …”
    Article
  16. 16

    Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm by Nikfal, Shima

    Published 2007
    “…In any software development lifecycle, testing is necessary to guarantee the quality of the end product. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20