Search Results - (( program coding based algorithm ) OR ( java detection system algorithm ))

Refine Results
  1. 1

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The experimental results show that the blood vessel detection system has worked well in the ARM platform with the Android OS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…The algorithm requires source codes comparison based on keyword similarity to extract the words that exist in the two related source codes. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Text steganalysis using evolution algorithm approach by Din, Roshidi, Tuan Muda, Tuan Zalizam, Lertkrai, Puriwat, Omar, Mohd Nizam, Amphawan, Angela, Aziz, Fakhrul Anuar

    Published 2012
    “…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Reusability techniques in load-flow analysis computer program by Nor, K.M., Mokhlis, Hazlie, Gani, T.A.

    Published 2004
    “…These methodologies made the developed load-flow analysis software flexible for future enhancement. Adding and changing codes and algorithm of the software can be done without affecting much the existing codes and algorithms. …”
    Get full text
    Get full text
    Article
  10. 10

    Online Programming Judge System (UOJ) by Tran , Quang Trung

    Published 2013
    “…The system has the function to judge programming code by evaluating the output that the program produced. …”
    Get full text
    Get full text
    Final Year Project
  11. 11
  12. 12

    Vision-based robot indoor navigation by Teo, Zhin Hang

    Published 2022
    “…The objective of this project is to design, develop and simulate programming code to perform image processing and path planning, integrate programming code with a microcontroller wirelessly, and test and evaluate the performance of the navigation robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Parallelization of speech compression based algorithm based on human auditory system on multicore system by Gunawan, Teddy Surya, Kartiwi, Mira, Khalifa, Othman Omran

    Published 2012
    “…To achieve a scalable parallel speech coding algorithm, single program multiple data (SPMD) programming model was used, in which a single program was written for all cores. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin by Kamarudin, Muhammad Zarif

    Published 2010
    “…A full programming documentation was done based on programming body modification and improvement. …”
    Get full text
    Get full text
    Monograph
  17. 17

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…And even though several of the code based addresses procedural programs. Some researchers addressed the issue of test case prioritization using Genetic Algorithm, but the authors do not select modification-revealing before prioritization and used the same fault severity. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Evaluation of Image Pixels Similarity Measurement Algorithm Accelerated on GPU with OpenACC by Abdulqader, Ibrahim Mundher, Lim, Kim Chuan

    Published 2017
    “…OpenACC is a directive based parallel programming library that allows for easy acceleration of existing C, C++ and Fortran based applications with minimal code modifications. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20