Search Results - (( java detection based algorithm ) OR ( system implementation modified algorithm ))

Refine Results
  1. 1

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…Due to the importance of blood vessel detection in many medical tools and the increasing demand for portable diagnosis equipment, fast blood vessel detection algorithm in a standalone and portable device is very important. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  6. 6

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Text steganalysis using evolution algorithm approach by Din, Roshidi, Tuan Muda, Tuan Zalizam, Lertkrai, Puriwat, Omar, Mohd Nizam, Amphawan, Angela, Aziz, Fakhrul Anuar

    Published 2012
    “…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Evaluation of structured questions using modified BLEU algorithm by Siraj, Fadzilah, Ali, Mohamed Salem

    Published 2016
    “…This paper describes and exemplifies an application of a Structured Exam Questions Test Bank and Evaluation Using Modified Bilingual Evaluation Understudy (BLEU) Algorithm, a software system developed in pursuit of robust computerized marking of free-text answers to open-ended questions.It employs the Information System Development Research Methodology with modified BLEU Algorithm and Expert System for similar words.The system was developed to facilitate in managing and administrating structured questions for client/server architecture based on intranet. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A modified H-bridge multilevel inverter for photovoltaic system by Abd Rahim, N., Chaniago, K., Selvaraja, J.

    Published 2010
    “…The proposed system was implemented in a prototype.…”
    Get full text
    Article
  10. 10
  11. 11

    An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf by Yusuf, Yusmardiah

    Published 2017
    “…Since the implementation of scheduling algorithm is an open issue in LTE, many packet scheduling algorithms have been proposed by researchers. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…The computation results show that the key generation process using the modified algorithm is around three times faster than the old implementation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Minimizing power loss using modified artificial bee colony algorithm / Nur Azlin Ashiqin Mohd Amin ...[et al.] by Mohd Amin, Nur Azlin Ashiqin, Jamaluddin, Siti Hafawati, Muhammat Pazil, Nur Syuhada, Mahmud, Norwaziah, Kimpol, Norhanisa

    Published 2021
    “…In this paper, the Modified Artificial Bee Colony (MABC) algorithm is implemented to solve the power system's optimal reactive power flow problem. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Parallel implementation of genomic sequences classification using modified gabor wavelet transform on multicore systems by Gunawan, Teddy Surya, Ambikairajah, Eliathamby

    Published 2012
    “…This paper presents the parallel implementation of the gene and exon identification of DNA sequences using the previously developed modified Gabor wavelet transform on multicore systems. …”
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Feature fusion using a modified genetic algorithm for face and signature recognition system by Suryanti, Awang

    Published 2015
    “…To overcome the issue of incompatible features to be combined, Wrapper Genetic Algorithm (GA) was implemented as the feature selection algorithm due to its ability to evaluate the features irrespective of which domain by masking the features with bit number. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain by Hussain, Muhamad Hatta

    Published 2020
    “…This thesis presents Modified Firefly Algorithm for Directional Overcurrent Relay Coordination in Power System Protection. …”
    Get full text
    Get full text
    Thesis
  20. 20

    MINIMIZATION OF RESOURCE UTILIZATION FOR A REAL-TIME DEPTH-MAP COMPUTATIONAL MODULE ON FPGA by NGO , NGO HUY TAN

    Published 2011
    “…However, the issue can also be addressed by implementing hardware architectures without the need to modify the depth-map algorithm. …”
    Get full text
    Get full text
    Thesis