Search Results - (( java implementation using algorithm ) OR ( learning coding learning algorithms ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…Several machine learning techniques based on supervised learning have been adopted in the classification of malware. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…We utilized the enhanced Q-Learning algorithm to compare actions, including context-based actions, to effectively achieve higher code coverage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Kodepoly: an engaging approach to blended futuristic learning in coding by Abd Rahman, Norsyafrina, Azhar Amanullah, Ayn Nur Azhana

    Published 2024
    “…By combining the strategic elements of Monopoly with a curriculum comprised of coding challenges, debugging exercises, and algorithmic puzzles, Kodepoly aims to render the learning process both enjoyable and substantial in content. …”
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  10. 10

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…Learning programming from source code examples is a common behavior among novices. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions by Goh, Kwang Yi, Baharom, Salmi, Din, Jamilah

    Published 2022
    “…Furthermore, the proposed techniques based on the Q-Learning algorithm do not consider context-based actions. …”
    Get full text
    Get full text
    Article
  13. 13

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  14. 14

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  16. 16

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…Attackers use code obfuscation to conceal malicious code, making it difficult for conventional systems and machine learning classifiers to detect threats. …”
    thesis::doctoral thesis
  17. 17

    Why coding? Why now? From coding to computational thinking through computational mathematics problem based learning (CM-PBL) by Ku, Soh Ting, Talib, Othman, Md. Yunus, Aida Suraya, Zolkepli, Maslina

    Published 2019
    “…There has been increased attention on learning coding in education field, in order to nurture sufficient number of young generation to fill in 50 percent of jobs opportunity in science, technology, engineering, and mathematics (STEM) which are computing-related. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Algorithm visualization design guidelines for mobile leaning by Supli, Ahmad Affandi, Shiratuddin, Norshuhada

    Published 2018
    “…This study is about the algorithm visualization design guidelines for mobile platform, to teach students data structures and algorithm (DSA) subject effectively. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis