Search Results - (( program code detection algorithm ) OR ( java data selection algorithm ))

Refine Results
  1. 1
  2. 2

    Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin by Kamarudin, Muhammad Zarif

    Published 2010
    “…This need to be done due to the fact that further improvement of this project will need the coding history on how the algorithm being developed thus documentation is the common practice in programming stage. …”
    Get full text
    Get full text
    Monograph
  3. 3

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin by Kamarudin, Muhammad Zarif

    Published 2010
    “…This need to be done due to the fact that further improvement of this project will need the coding history on how the algorithm being developed thus documentation is the common practice in programming stage. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…And even though several of the code based addresses procedural programs. Some researchers addressed the issue of test case prioritization using Genetic Algorithm, but the authors do not select modification-revealing before prioritization and used the same fault severity. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Performance Analysis In IoT Based Home Automation Using Hybrid RS-LDPC Codes by Ng, Lay Wei

    Published 2018
    “…The thesis proposes an error detection and correction algorithms using Hybrid RS-LDPC codes for the channel encoding and decoding in the home automation system. …”
    Get full text
    Get full text
    Monograph
  7. 7

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…The algorithm was written in Python programming language to be implementing on a POX controller. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…Then canonical Polyadic decomposition-based attribute reduction is applied to the offload-able task to reduce the data size. Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
    Get full text
    Get full text
    Article
  10. 10

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…The result shows that with native programming on Android platform, even a complicated object detection algorithm can be done in real-time.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This approach is also able to remove the vulnerabilities detected in the tested web application source codes. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Dhany, Saputra

    Published 2008
    “…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
    Get full text
    Thesis
  16. 16

    The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…Design-based regression testing approaches have been proposed to address changes at higher levels of abstraction, these approaches may not detect changes in the method body and several of the code based addresses procedural programs. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Hybrid genetic algorithm for improving fault localization by Mahamad Zakaria, Muhammad Luqman, Sharif, Khaironi Yatim, Abd Ghani, Abdul Azim, Koh, Tieng Wei, Zulzalil, Hazura

    Published 2018
    “…In this light, many techniques have been proposed such as program slicing, code coverage, program state and mutation analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Saputra , Dhany, Rambli, Dayang R.A., Foong, Oi Mean

    Published 2008
    “…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Reducing of Inconsistent Data using Fuzzy Multi Attribute Decision Making for Accessing Data from Database by Yusof, Mohd Kamir, Abdul Rahman, Mohd Nordin, Azlan, Atiqah

    Published 2013
    “…Sample data was selected for experiments purposes. The result indicates fuzzy multi attribute decision making is a suitable technique in reducing inconsistent data from database. …”
    Get full text
    Get full text
    Article