Search Results - (( development process normalization algorithm ) OR ( java detection modified algorithm ))
Search alternatives:
- normalization algorithm »
- detection modified »
- java detection »
-
1
Challenges of hidden data in the unused area two within executable files
Published 2009“…There are many challenges of hidden data in the unused area two within executable files, which is dependencies of the size of the cover file with the size of hidden information, differences of the size of file before and after the hiding process, availability of the cover file after the hiding process to perform normally and detection by antivirus software as a result of changes made to the file. …”
Get full text
Get full text
Get full text
Article -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Validation was conducted through three experiments involving four Java programs. The results demonstrated high effectiveness, with scores ranging from 93.91% to 99.51% on the scaled weighted average percentage of faults detected (APFD) metric. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Thesis -
7
Text normalization algorithm for facebook chats in Hausa language
Published 2014“…The proposed algorithm manually developed dictionary that employ normalization of each non-standard word with its equivalent standard word. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Application of Technology Acceptance Model on Database Normalizer
Published 2011“…The main objective of this study is to develop a database normalizer application to normalize the database tables up to the third normal form (3NF). …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
Get full text
Get full text
Monograph -
11
Widely linear dynamic quaternion valued least mean square algorithm for linear filtering
Published 2017“…The new adaptive algorithm is called dynamic quaternion least mean square algorithm (DQLMS) because of the normalization process of the filter input and the variable step-size. …”
Get full text
Get full text
Get full text
Thesis -
12
Taguchi?s T-method with Normalization-Based Binary Bat Algorithm
Published 2025“…An experimental study was conducted, and the variable selection process using the normalization-based Binary Bat algorithm found a better combination of input variables which consists of only six out of eight variables. …”
Conference paper -
13
The normalized random map of gradient for generating multifocus image fusion
Published 2020“…Many researchers have developed many new and sophisticated methods. They show complicated computation and algorithm. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…Log likelihood estimation technique is used to fitted the best 2-parameter CDF compared to WeibuII, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Article -
16
Fault diagnostic algorithm for precut fractionation column
Published 2004“…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
Get full text
Get full text
Conference or Workshop Item -
17
Investigation And Development Of Flattening Algorithms For Curved Latent Fingerprint Images
Published 2015“…Algorithm that applies ellipse approximation provides better performance as compared with the algorithm that developed based on parabolic approximation. …”
Get full text
Get full text
Thesis -
18
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
19
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Software requirement specification (SRS) document is the most crucial document in software development process. SRS is normally produced during the initial part of software development process and all subsequent steps in software development are influenced by the requirements. …”
Get full text
Get full text
Get full text
Thesis -
20
Neural network based model predictive control for a steel pickling process
Published 2009“…A multi-layer feedforward neural network model based predictive control scheme is developed for a multivariable nonlinear steel pickling process in this paper. …”
Get full text
Get full text
Article
