Search Results - (( program implementation modified algorithm ) OR ( java data detection algorithm ))

Refine Results
  1. 1

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network by Kang, Miew How

    Published 2016
    “…In this research, a hand-written character recognition model are implemented in C++ programming with ability to classify digits 0, 1, 2, and 3. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Parallel implementation of genomic sequences classification using modified gabor wavelet transform on multicore systems by Gunawan, Teddy Surya, Ambikairajah, Eliathamby

    Published 2012
    “…Single Program Multiple Data (SPMD) parallel paradigm will be used in the parallel implementation. …”
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Hybrid meta-heuristic algorithm for solving multi-objective aggregate production planning in fuzzy environment by Kalaf, Kalaf, Bayda Atiya

    Published 2017
    “…For these proposed approaches, this study adopted a hybridization of a fuzzy programming, modify simulated annealing, and simplex downhill (SD) algorithm called Fuzzy-MSASD to resolve multiple objective linear programming APP problems in a fuzzy environment. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A study on solution of matrix riccati differential equations using ant colony programming and simulink / Mohd Zahurin Mohamed Kamali by Mohamed Kamali, Mohd Zahurin

    Published 2015
    “…It has been found that by implementing the ACP algorithm, the solution predicted is approximately close or similar to the exact solution. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain by Hussain, Muhamad Hatta

    Published 2020
    “…The Electric Transient and Analysis Program (ETAP) was used as the simulation tool, while Matrices Laboratory (MATLAB) was utilized to implement all the algorithms in this study. …”
    Get full text
    Get full text
    Thesis
  12. 12

    1D Multigrid Solver For Finite Element Method by Azhar, Mohamad Amiruddin

    Published 2022
    “…A sample of such code written in MATLAB programming language was found in the GitHub repository, where the implemented algorithms are far from optimal. …”
    Get full text
    Get full text
    Monograph
  13. 13

    VHDL implementation of a low frequency low pass IIR filter by Awang Noor, Ahmad Ilmi Farid

    Published 2009
    “…An IIR filter is designed using algorithms and is programmed using the VHDL language. …”
    Get full text
    Get full text
    Student Project
  14. 14
  15. 15

    Improved ADALINE Harmonics Extraction Algorithm for Boosting Performance of Photovoltaic Shunt Active Power Filter under Dynamic Operations by Mohd Zainuri, M.A.A., Radzi, M.A.M., Soh, A.C., Mariun, N., Rahim, N.A.

    Published 2016
    “…For hardware implementation, laboratory prototype has been developed and the proposed algorithm was programmed in TMS320F28335 DSP board. …”
    Get full text
    Get full text
    Article
  16. 16

    Parallel Implementation of Two Level Barotropic Models Applied to the Weather Prediction Problem by Bahri, Susila

    Published 2004
    “…To process the data collected from British Atmospheric Data Centre (BADC), the sequential programs in row and columnwise fashions are developed and implemented. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar by Vijyakumar, Kanendra Naidu

    Published 2015
    “…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  19. 19
  20. 20

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis