Search Results - (( development (programme OR programs) function algorithm ) OR ( java detection system algorithm ))

Refine Results
  1. 1

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The experimental results show that the blood vessel detection system has worked well in the ARM platform with the Android OS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    IMAGE PROCESSING ALGORITHMS ON FPGA by MOHAMED SHUKOR, MOHAMED NASIR

    Published 2007
    “…Verilog HDL is chosen as the hardware programming language for these systems and its compiled using Quartus II program. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Implementation of Color Filtering on FPGA by Mohd Shukor, Mohd Nasir, Lo, H. H., Sebastian, Patrick

    Published 2007
    “…The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Text steganalysis using evolution algorithm approach by Din, Roshidi, Tuan Muda, Tuan Zalizam, Lertkrai, Puriwat, Omar, Mohd Nizam, Amphawan, Angela, Aziz, Fakhrul Anuar

    Published 2012
    “…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Implementation of color filtering on FPGA by P., Sebastian, M.N.B.M., Shukor, H.H., Lo

    Published 2007
    “…The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…Two techniques were developed. The first technique is to encode the logic programming in radial basis function neural networks. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…This would greatly shorten the instructions used by the algorithms and improved the execution time of the programmes. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Design And Development Of Gas Argon Purging System by Ooi, Seng Yeong

    Published 2006
    “…Using AMPL (ABB Master Program Language) with ABB PLC controller is much different from Siemens or Mitsubishi PLC programming which they intended to use ladder diagram as function for the control system. …”
    Get full text
    Get full text
    Monograph
  17. 17

    The prevalence and functional impact of rare genomic copy number variation in hypertension-related left ventricular hypertrophy / Julia Ashazila Mat Jusoh by Mat Jusoh, Julia Ashazila

    Published 2020
    “…Regression of cardiac hypertrophy by losartan treatment not only works directly via blood pressure reduction and but also at least in part, attenuating foetal gene program activation. In conclusion, more than a quarter of hypertensive male Malaysians had LVH and genetic factor (rare CNV) plays a contributing factor to the development of HT LVH+ through alteration of the functional regulation of foetal cardiac gene programme. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A new meta heuristic evolutionary programming (NMEP) in optimizing economic energy dispatch by Mohamad Ridzuan, Mohamad Radzi, Hassan, Elia Erwani, Abdullah, Abdul Rahim, Bahaman, Nazrulazhar, Abdul Kadir, Aida Fazliana

    Published 2016
    “…The proposed optimization algorithm, namely New Meta-Heuristic Evolutionary Programming (NMEP) algorithm is followed to Meta-Heuristic Evolutionary Programming (Meta-EP) approach with some modification where the cloning process embedded as a significant progress during the implementation. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Some metaheuristic algorithms for solving multiple cross-functional team selection problems by Ngo, S.T., Jaafar, J., Izzatdin, A.A., Tong, G.T., Bui, A.N.

    Published 2022
    “…We compared the developed algorithms with the MIQP-CPLEX solver on 500 programming contestants with 37 skills and several randomized distribution datasets. …”
    Get full text
    Get full text
    Article