Search Results - (( program integration detection algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- integration detection »
- application testing »
- testing algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan
Published 2023“…The project follows a modified waterfall approach, focusing on creating a user-friendly interface and integrating the Random Forest Classification Algorithm for accurate detection. …”
Get full text
Get full text
Thesis -
3
An optimal mesh algorithm for remote protein homology detection
Published 2011“…This paper further presents the best combinations of multiple alignment and classification programs to be chosen. This paper also improves the quality of the multiple alignments via integration of a refinement algorithm. …”
Get full text
Get full text
Article -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
5
Fault detection with optimum March Test Algorithm
Published 2012“…Therefore to improve fault detection, an automation program is developed based on sequence operation (SQ) generation rules. …”
Get full text
Conference or Workshop Item -
6
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection
Published 2019“…Therefore, two automated procedures are developed to determine these parameters iteratively. The FBTS integrated with automated edge-preserving regularization algorithm is implemented in C++ programming language executed in parallel computing. …”
Get full text
Get full text
Thesis -
9
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
Get full text
Get full text
Get full text
Article -
10
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The integrated classifier algorithm applied to examine, classify and generate rules of the pattern and program behaviour of system call information. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
13
-
14
-
15
Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection
Published 2019“…This integrated classifier algorithm applied to analyse, classify and generate rules of the pattern and program behaviour of system call information in which, the legal and illegal behaviours could identify. …”
Get full text
Get full text
Get full text
Article -
16
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
-
20
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project
