Search Results - (( java application tools algorithm ) OR ( using code ((using algorithm) OR (mining algorithm)) ))
Search alternatives:
- application tools »
- java application »
- mining algorithm »
- tools algorithm »
- using algorithm »
- using code »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
Get full text
Get full text
Thesis -
4
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
Classroom finder system with student availability, space and time constraint
Published 2024“…Scrum methodology was selected for the development methodology of this project while the tools of HTML, CSS, JavaScript, Bootstrap, Jinja2 Template Engine, Flask, SQLite and VS Code are used in the development of this project. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…Objectives include analyzing features of mobile robot planning and representing them in ACO and GA, implementation ACO and GA algorithms for solving routing problems using dataset, and evaluating their performance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
10
-
11
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
12
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…In this method, the candidate detectors generated by particle swarm optimization form rules using apriori association rule. These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
14
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…From the data analysis using WEKA software, the production rules classifier (PART) is found to be the most accurate classification algorithm in classifying the emotion which yields the highest precision percentage of 99.6% compared to J48 (99.5%) and Naïve Bayes (96.2%). …”
Get full text
Get full text
Thesis -
15
Comparative analysis for topic classification in juz Al-Baqarah
Published 2018“…This research project is aiming to create computing environment that enable us use to text mining the Quran. The classification experiment is using the Support Vector Machine to find themes in Juz‟ Baqarah. …”
Get full text
Get full text
Article -
16
The future of money: cryptocurrency is the way to go in Malaysia / Dr. Zuraidah Mohamed Isa, Dr. Dahlia Ibrahim and Dr. Mohamad Hanif Abu Hassan
Published 2022“…Cryptocurrency is a system that uses computers to mine it, where mining requires the solution of several mathematical algorithms. …”
Get full text
Get full text
Book Section -
17
Classification of metamorphic virus using n-grams signatures
Published 2020“…Then, the virus cluster is evaluated using Naïve Bayes algorithm in terms of accuracy using performance metric. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
19
-
20
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
