Search Results - (( java detection modified algorithm ) OR ( program implementation matching algorithm ))

Refine Results
  1. 1
  2. 2

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad by Muhamad, Kamarul Arifin

    Published 2002
    “…First experiment uses exact match, which is no method, is apply. Second experiment uses dynamic programmings apply with Wagner and Fischer algorithm.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Selection of prospective workers using profile matching algorithm on crowdsourcing platform by Cucus, Ahmad, Aji, Luhur Bayu, Al Fahim, Mubarak Ali, Aminuddin, Afrig, Farida, Lilis Dwi

    Published 2022
    “…These criteria become variables that are used in the profile matching algorithm to find workers who best match the profiles offered. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Validation was conducted through three experiments involving four Java programs. The results demonstrated high effectiveness, with scores ranging from 93.91% to 99.51% on the scaled weighted average percentage of faults detected (APFD) metric. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players by Mohammad Zukuwwan, Zainol Abidin

    Published 2021
    “…The system can provide the team formation and players, and calculate the strength of the KFA team to justify its winning and loss of 2019 FA Cup and Malaysia Cup final matches respectively. This system can help coaches to solve problem regarding the strong team development with available players and motivate the use of decision technologies in sports able to match the results from the real world implementation.…”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Cyclic redundancy encoder for error detection in communication channels by Khalifa, Othman Omran, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2004
    “…This paper describes the methodology used and the implementation of the Cyclic Redundancy Check (CRC) algorithm using Ci+ programming. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    An integrated reservoir modelling and evolutionary algorithm for optimizing field development in a mature fractured reservoir by Sambo, C.H., Hematpour, H., Danaei, S., Herman, M., Ghosh, D.P., Abass, A., Elraies, K.A.

    Published 2016
    “…The second method is automatic optimization using Genetic Algorithm. That depends on the principle of natural selection as proposed by Darwin The genetic program was coupled with the reservoir flow model to re-evaluate the chosen wells at each iteration until obtaining the optimal choice. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri by ‘Asri, Nur Nadia Syahirah

    Published 2017
    “…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
    Get full text
    Get full text
    Thesis
  19. 19

    The Development of Color Based Visual Search Utility by Mohamed, Al Mabruk S.

    Published 2001
    “…Finally, a binary search algorithm was used to match and display images requested. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
    Get full text
    Get full text
    Thesis