Search Results - (( java detection method algorithm ) OR ( program implementation matching algorithm ))*
Search alternatives:
- implementation matching »
- program implementation »
- method algorithm »
- java detection »
-
1
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023Conference paper -
3
-
4
Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad
Published 2002“…First experiment uses exact match, which is no method, is apply. Second experiment uses dynamic programmings apply with Wagner and Fischer algorithm.…”
Get full text
Get full text
Thesis -
5
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
7
Selection of prospective workers using profile matching algorithm on crowdsourcing platform
Published 2022“…These criteria become variables that are used in the profile matching algorithm to find workers who best match the profiles offered. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Implementing case-based reasoning approach to framework documentation
Published 2023Conference paper -
9
-
10
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Can recognition using LABVIEW / Jamilah Othman
Published 2008Get full text
Get full text
Student Project -
12
An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players
Published 2021“…The system can provide the team formation and players, and calculate the strength of the KFA team to justify its winning and loss of 2019 FA Cup and Malaysia Cup final matches respectively. This system can help coaches to solve problem regarding the strong team development with available players and motivate the use of decision technologies in sports able to match the results from the real world implementation.…”
Get full text
Get full text
Get full text
Thesis -
13
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
Get full text
Get full text
Thesis -
14
-
15
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
Cyclic redundancy encoder for error detection in communication channels
Published 2004“…This paper describes the methodology used and the implementation of the Cyclic Redundancy Check (CRC) algorithm using Ci+ programming. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
An integrated reservoir modelling and evolutionary algorithm for optimizing field development in a mature fractured reservoir
Published 2016“…The second method is automatic optimization using Genetic Algorithm. That depends on the principle of natural selection as proposed by Darwin The genetic program was coupled with the reservoir flow model to re-evaluate the chosen wells at each iteration until obtaining the optimal choice. …”
Get full text
Get full text
Conference or Workshop Item
