Search Results - (( java implementation modified algorithm ) OR ( using code detection algorithm ))

Refine Results
  1. 1

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A new corner detection algorithm for chain code representation. by Haron , Habibollah, Shamsuddin , Siti Mariyam, Mohamed, Dzulkifli

    Published 2005
    “…A new algorithm is proposed to detect a corner of a thinned binary image that is represented by an eight-connected contour chain code. …”
    Get full text
    Get full text
    Article
  4. 4

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional by Haron, Habibollah

    Published 2006
    “…These algorithm are used to produce chain code series that represented a thinned binary image of the sketch. …”
    Get full text
    Get full text
    Monograph
  7. 7

    A low complexity multi-layered space frequency coding detection algorithm for MIMO-OFDM by Chong, Jin Hui, Ng, Chee Kyun, Noordin, Nor Kamariah, Mohd Ali, Borhanuddin

    Published 2012
    “…A low complexity multi-layered space frequency OFDM (MLSF-OFDM) coding scheme is presented with the proposed two detection algorithms, fast QR decomposition detection algorithm or denoted as FAST-QR and enhanced FAST-QR (E-FAST-QR). …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  10. 10

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…Using a number of candidate detectors from an improved Apriori Algorithm with Particle Swarm Optimization, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhanced algorithms for three-dimensional object interpreter by Haron, Habibollah

    Published 2004
    “…The second is the modified Freeman chain code algorithm that is used to produce chain code series that represented a thinned binary image of the sketch. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Sphere detection analysis performance combined with the LDPC decoding / Xiao Peng and Satoshi Goto by Xiao, Peng, Satoshi, Goto

    Published 2011
    “…For LDPC codes, min-sum and layered decoding algorithms are discussed, and for MIMO detection, the maximum likelihood (ML) decision based on the sphere decoding algorithm is mainly analyzed. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A study on channel coding for 5G / Xu Wei by Xu , Wei

    Published 2019
    “…Channel coding is the process of error detection and correction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…To overcome the stated problems, RD code families are used throughout this stage. Secondly, a new detection technique based on spectral direct detection is developed and compared to the reported detection techniques. …”
    Get full text
    Thesis
  17. 17

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Object detection system using haar-classifier by Wan Najwa, Wan Ismail

    Published 2009
    “…Object detection system using Haar-classifier algorithm can perform best performance of high detection rate and high level of accuracy rate.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Another limitation is the limited or lack of focus on the removal of XSS vulnerabilities after their detection in the source code. Consequently, an approach called XSS-DETREM has been proposed with the objectives of combining genetic algorithms with static analysis, and a code replacement technique to detect and remove XSS vulnerabilities, respectively, to address the problem of XSS at the source code level. …”
    Get full text
    Get full text
    Get full text
    Thesis