Search Results - (( program coding method algorithm ) OR ( java detection using algorithm ))
Search alternatives:
- method algorithm »
- using algorithm »
- program coding »
- java detection »
- coding method »
-
1
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…The experimental results show that out of the eight images processing methods, six methods that are executed using the native programming are faster than that of the JAVA programming with a total average ratio of 0.41. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Reusability techniques in load-flow analysis computer program
Published 2004“…The reusability in the algorithm and codes are obtained by applying matrix partitioning approach for Newton method and sequential approach for Fast Decoupled method. …”
Get full text
Get full text
Article -
5
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
6
Parallel Block Methods for Solving Ordinary Differential Equations
Published 2004“…The new codes are based on the implicit multistep block methods formulae. …”
Get full text
Get full text
Thesis -
7
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…As for WXES3l82, the thesis cover the development of programming code, the code implementation and testing and the evaluation including discussion about the problem/constraints meed in the coding program development. …”
Get full text
Get full text
Thesis -
8
Online Programming Judge System (UOJ)
Published 2013“…The system has the function to judge programming code by evaluating the output that the program produced. …”
Get full text
Get full text
Final Year Project -
9
Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes
Published 2007“…In parallel programming, the challenges in optimizing the codes in general are more than that for serial programming. …”
Get full text
Get full text
Research Report -
10
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
Get full text
Get full text
Thesis -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
12
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
13
A combined filter line search and trust region method for nonlinear programming
Published 2006“…A framework for solving a class of nonlinear programming problems via the filter method is presented. …”
Get full text
Article -
14
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
16
1D Multigrid Solver For Finite Element Method
Published 2022“…Usually, the mathematical problem can be solved using only one of those two methods. A sample of such code written in MATLAB programming language was found in the GitHub repository, where the implemented algorithms are far from optimal. …”
Get full text
Get full text
Monograph -
17
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…It will include the coding of python programming coding and calculation of proposed method. …”
Get full text
Get full text
Student Project -
18
Swarm inspired test case generation for online C++ programming assessment
Published 2014“…It is time consuming for lecturers to manually compile, run and verify students' programming assignments. Moreover, they also need to define test cases for different programming exercises in order to assess students' code. …”
Get full text
Get full text
Conference or Workshop Item -
19
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
Get full text
Get full text
Thesis -
20
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…Taking into account from those main issues, this study introduces the new model of integrated algorithm-program visualization (ALPROV) for developing program comprehension tool. …”
Get full text
Get full text
Get full text
Get full text
Thesis
