Search Results - (( java based detection algorithm ) OR ( basic computer knowledge algorithm ))

Search alternatives:

Refine Results
  1. 1

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…Due to the importance of blood vessel detection in many medical tools and the increasing demand for portable diagnosis equipment, fast blood vessel detection algorithm in a standalone and portable device is very important. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  5. 5

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    CSC645 - Algorithm Analysis and Design / College of Computing, Informatics and Media by UiTM, College of Computing, Informatics And Media

    Published 2022
    “…This course focuses on both the design and analysis of algorithms. It provides students with basic knowledge and techniques required to design efficient algorithms and analyse their efficiency, as well as demonstrate the key relationships between problem solving, algorithm design, data structures, programs and algorithm analysis, and the effects of the choices. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  7. 7

    Text steganalysis using evolution algorithm approach by Din, Roshidi, Tuan Muda, Tuan Zalizam, Lertkrai, Puriwat, Omar, Mohd Nizam, Amphawan, Angela, Aziz, Fakhrul Anuar

    Published 2012
    “…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    CSC645: Algorithm Analysis and Design / College of Computing, Informatics and Mathematics by UiTM, College of Computing, Informatics and Mathematics

    Published 2019
    “…This course focuses on both the design and analysis of algorithms. It provides students with basic knowledge and techniques required to design efficient algorithms and analyse their efficiency, as well as demonstrate the key relationships between problem solving, algorithm design, data structures, programs and algorithm analysis, and the effects of the choices. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  9. 9

    CSC099: Foundation Computing II / Centre of Foundation Studies by UiTM, Centre of Foundation Studies

    Published 2022
    “…This course introduces basic computer programming algorithm, problem solving, structured programming language, selection structure, repetition structure, function and array. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  10. 10
  11. 11

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…In the software development testing we examine image based clustering, as we can used clustering by distance base, by pixel (red, green, blue) value etc., The problem is solved by region based method which is based on connect component and background detection techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    DSC766: Text Analytics / College of Computing, Informatics and Mathematics by UiTM, College of Computing, Informatics and Mathematics

    Published 2020
    “…Student will learn the basic concepts, principles, and major algorithms in text mining and their potential applications.…”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  18. 18

    Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu by Sabtu, Melati

    Published 2005
    “…The project used Back-propagation Neural Network for the algorithm to classified images. Images that capture using digital camera will perform through the algorithm to classified images. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A study on matrix factorization and its applications by Tang, Adrian Wen Kai

    Published 2021
    “…Computational steps are important as it serves the basic knowledge to code it in Python. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
    Get full text
    Get full text
    Thesis