Search Results - (( java implementation new algorithm ) OR ( using code selection algorithm ))

Refine Results
  1. 1

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…In addition, it was able to encode files that were smaller by 50% than current colour QR codes. The FQR code decoder used a colour reference to select the number of colours needed to overcome the dynamic colour selection limitation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Expanding the data capacity of QR codes using multiple compression algorithms and base64 encode/decode by Abas, Azizi, Yusof, Yuhanis, Ahmad, Farzana Kabir

    Published 2017
    “…This study focuses on the selection of compression algorithms and use base64 encoder/decoder to increase the capacity of data which is to be stored in the QR code. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  7. 7

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  8. 8

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…We utilized the enhanced Q-Learning algorithm to compare actions, including context-based actions, to effectively achieve higher code coverage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    An optimum drill bit selection technique using artificial neural networks and genetic algorithms to increase the rate of penetration by Momeni, M., Hosseini, S.J., Ridha, S., Laruccia, M.B., Liu, X.

    Published 2018
    “…However, some researchers have used bit codes as input or output variables. This paper illustrates that the bit codes are better used in referring to the name of each bit instead of using them as values for calculation in the ANN model. …”
    Get full text
    Get full text
    Article
  16. 16

    Genetic algorithm based network coding in wireless ad hoc networks by Tan, Shee Eng

    Published 2013
    “…Genetic algorithm based coding-aware routing (GACAR) is embedded in the wireless ad hoc network with network coding capabilities to search for coding opportunities for unicast sessions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A review of crossover methods and problem representation of genetic algorithm in recent engineering applications by Zainuddin, Farah Ayiesya, Abd Samad, Md Fahmi

    Published 2020
    “…The algorithm operates on three simple genetic operators called selection, crossover and mutation. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…This paper propose an optimized regression test case selection and prioritization for object-oriented software based on dependence graph model analysis of the source code and optimized the selected test case using Genetic Algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
    Get full text
    Get full text
    Thesis