Search Results - (( java _ implementation algorithm ) OR ( learning coding learning algorithm ))
Search alternatives:
- implementation algorithm »
- learning algorithm »
- learning coding »
- coding learning »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…Several machine learning techniques based on supervised learning have been applied to classify malware. …”
Get full text
Get full text
Get full text
Article -
3
-
4
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
5
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…Several machine learning techniques based on supervised learning have been adopted in the classification of malware. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We utilized the enhanced Q-Learning algorithm to compare actions, including context-based actions, to effectively achieve higher code coverage. …”
Get full text
Get full text
Get full text
Thesis -
7
Kodepoly: an engaging approach to blended futuristic learning in coding
Published 2024“…By combining the strategic elements of Monopoly with a curriculum comprised of coding challenges, debugging exercises, and algorithmic puzzles, Kodepoly aims to render the learning process both enjoyable and substantial in content. …”
Get full text
Get full text
Proceeding Paper -
8
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…Learning programming from source code examples is a common behavior among novices. …”
Get full text
Get full text
Get full text
Article -
9
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…Furthermore, the proposed techniques based on the Q-Learning algorithm do not consider context-based actions. …”
Get full text
Get full text
Article -
10
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
11
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
Get full text
Get full text
Monograph -
12
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…Attackers use code obfuscation to conceal malicious code, making it difficult for conventional systems and machine learning classifiers to detect threats. …”
thesis::doctoral thesis -
13
Why coding? Why now? From coding to computational thinking through computational mathematics problem based learning (CM-PBL)
Published 2019“…There has been increased attention on learning coding in education field, in order to nurture sufficient number of young generation to fill in 50 percent of jobs opportunity in science, technology, engineering, and mathematics (STEM) which are computing-related. …”
Get full text
Get full text
Conference or Workshop Item -
14
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
15
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
16
Algorithm visualization design guidelines for mobile leaning
Published 2018“…This study is about the algorithm visualization design guidelines for mobile platform, to teach students data structures and algorithm (DSA) subject effectively. …”
Get full text
Get full text
Get full text
Article -
17
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
18
-
19
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…The data was gathered using real-time packet capturing tools which were then processed and moved with model development using different deep learning algorithms such as, LSTM, MLP, RNN and Autoencoders. …”
Get full text
Get full text
Get full text
Article -
20
