Search Results - (( programming language extraction algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    An Information Retrieval Algorithm to Extract Influential Factors by Nabilah Filzah, Mohd Radzuan

    Published 2012
    “…Data consisted of financial factors that were obtained from financial documents of distressed companies and non-distressed companies listed on a stock exchange. The extraction algorithm was developed and implemented using Matlab programming language. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…Generally, these source codes go through the preprocessing, comparison, extraction, generate program semantics and classification processes. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11
  12. 12

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    The Development of Color Based Visual Search Utility by Mohamed, Al Mabruk S.

    Published 2001
    “…The system was implemented using Microsoft Visual C++ programming language and HTML. Using 200 images as an experimental database, results of the prototype software demonstrated the achievement of the perceptual concept in image content search.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli by Mohd Ramli, Mohamad Amirul Asyraf

    Published 2023
    “…This research utilizing the Python programming language and the PyCharm integrated development environment (IDE) to integrate coding into the processing. …”
    Get full text
    Get full text
    Student Project
  17. 17

    An improved Malaysian automatic license plate recognition (M-ALPR) system using hybrid fuzzy in C++ environment by Thanin, Khairunnisa, Mashohor, Syamsiah, Al Faqheri, Wisam Salah

    Published 2009
    “…First, the algorithm to recognize the license plates is presented, by taking advantage of Matlab and C++ programming language benefits in order to increase system efficiency. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A new search and extraction technique for motion capture data by Mohamad, Rafidei

    Published 2008
    “…Results from the experiments show that matching motion files were successfully extracted from the motion capture library using the new algorithm based on different human body segments.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Ump Intelligent Chatbot Using Dialogflow by Joachim, Agostain

    Published 2022
    “…To create such a chatbot, a machine learning algorithm is used to learn the human language that is mainly used during such conversations. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The obvious amount of lost money of victims has led to many court cases where victim and theft claims the ownership of the program and the winner is who has a good lawyer. Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. …”
    Get full text
    Get full text
    Thesis