Search Results - (( development code extraction algorithm ) OR ( java data detection algorithm ))
Search alternatives:
- extraction algorithm »
- development code »
- code extraction »
- data detection »
- java »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…The appropriate Java codes are developed for solve this task. The developed patterns are applied in the field of real-time analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
3
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
4
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
5
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…In this research, a Crow Search Algorithm (CSA)-based metaheuristic strategy for feature extraction in HCR was developed. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…The neural network package in Matlab software was used by this artificial intelligent method to develop a neural network classifier. Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
9
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
10
Extracting Object Oriented Software Architecture from C++ Source Code
Published 2000“…In addition, it is not all that software development begins with a clean slate; systems are almost always constrained by the existing legacy code. …”
Get full text
Get full text
Thesis -
11
Integration Of G-Code With Position Controller Via Interpreter Design Using MATLAB For Milling Machine Application
Published 2019“…The interpreter functions to extract and interpret the x and y data positions from the generated G-code. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
Language identification system using Matlab: design, implementation, and sample codes
Published 2017“…This book investigates the development of language identification based on Mel-Frequency Cepstral Coefficients (MFCC) and Vector Quantization (VQ) algorithm. …”
Get full text
Get full text
Book -
14
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
15
-
16
Development of an intelligent multimodal biometric system for household appliances control
Published 2012“…Furthermore, a text-dependent voice recognition scheme was developed by extracting the vocal tract features of individuals’ on the pronunciation of a specific word using linear predictive coding (LPC) technique. …”
Get full text
Get full text
Get full text
Monograph -
17
Scene classification for aerial images based on CNN using sparse coding technique
Published 2017“…However, cataloguing presents a fundamental problem for high-resolution remote-sensing imagery (HRRS). Recent developments include several approaches and numerous algorithms address the task. …”
Get full text
Get full text
Article -
18
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The data collected for this machine learning model is using the statistically significant features from vibration and acoustic analysis. The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. …”
Get full text
Get full text
Monograph -
19
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…There is also a need to develop a tool that contains the three approaches where the developer can customize the protection of the source code.…”
Get full text
Get full text
Thesis -
20
Scene classification for aerial images based on CNN using sparse coding technique
Published 2023Article
