Search Results - (( java application bat algorithm ) OR ( using code detection algorithm ))

Refine Results
  1. 1

    A new corner detection algorithm for chain code representation. by Haron , Habibollah, Shamsuddin , Siti Mariyam, Mohamed, Dzulkifli

    Published 2005
    “…A new algorithm is proposed to detect a corner of a thinned binary image that is represented by an eight-connected contour chain code. …”
    Get full text
    Get full text
    Article
  2. 2

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional by Haron, Habibollah

    Published 2006
    “…These algorithm are used to produce chain code series that represented a thinned binary image of the sketch. …”
    Get full text
    Get full text
    Monograph
  5. 5

    A low complexity multi-layered space frequency coding detection algorithm for MIMO-OFDM by Chong, Jin Hui, Ng, Chee Kyun, Noordin, Nor Kamariah, Mohd Ali, Borhanuddin

    Published 2012
    “…A low complexity multi-layered space frequency OFDM (MLSF-OFDM) coding scheme is presented with the proposed two detection algorithms, fast QR decomposition detection algorithm or denoted as FAST-QR and enhanced FAST-QR (E-FAST-QR). …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…Using a number of candidate detectors from an improved Apriori Algorithm with Particle Swarm Optimization, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Enhanced algorithms for three-dimensional object interpreter by Haron, Habibollah

    Published 2004
    “…The second is the modified Freeman chain code algorithm that is used to produce chain code series that represented a thinned binary image of the sketch. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Sphere detection analysis performance combined with the LDPC decoding / Xiao Peng and Satoshi Goto by Xiao, Peng, Satoshi, Goto

    Published 2011
    “…For LDPC codes, min-sum and layered decoding algorithms are discussed, and for MIMO detection, the maximum likelihood (ML) decision based on the sphere decoding algorithm is mainly analyzed. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A study on channel coding for 5G / Xu Wei by Xu , Wei

    Published 2019
    “…Channel coding is the process of error detection and correction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…To overcome the stated problems, RD code families are used throughout this stage. Secondly, a new detection technique based on spectral direct detection is developed and compared to the reported detection techniques. …”
    Get full text
    Thesis
  13. 13

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Object detection system using haar-classifier by Wan Najwa, Wan Ismail

    Published 2009
    “…Object detection system using Haar-classifier algorithm can perform best performance of high detection rate and high level of accuracy rate.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Another limitation is the limited or lack of focus on the removal of XSS vulnerabilities after their detection in the source code. Consequently, an approach called XSS-DETREM has been proposed with the objectives of combining genetic algorithms with static analysis, and a code replacement technique to detect and remove XSS vulnerabilities, respectively, to address the problem of XSS at the source code level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Error performance in BCH codes / Zurina Mohamed by Mohamed, Zurina

    Published 2003
    “…This thesis covers the theoretical and the practical design of the BCH codes. The theoretical part covers the algorithms used, how they are encoded and decoded and how they are used to correct errors. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Performance Analysis In IoT Based Home Automation Using Hybrid RS-LDPC Codes by Ng, Lay Wei

    Published 2018
    “…The thesis proposes an error detection and correction algorithms using Hybrid RS-LDPC codes for the channel encoding and decoding in the home automation system. …”
    Get full text
    Get full text
    Monograph
  18. 18
  19. 19

    PCB defect detection system using run-length encoding by Zakaria, Muhammad Anif

    Published 2017
    “…The outcomes by using this technique is it can classify and detect the defect of the PCB. …”
    Get full text
    Get full text
    Student Project
  20. 20