Search Results - (( programming problem detection algorithm ) OR ( java application a algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Hybrid genetic algorithm for improving fault localization by Mahamad Zakaria, Muhammad Luqman, Sharif, Khaironi Yatim, Abd Ghani, Abdul Azim, Koh, Tieng Wei, Zulzalil, Hazura

    Published 2018
    “…Genetic algorithm (GA) is well known in finding an optimal solution to a problem while local search is capable of removing duplication. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…In this research, an approach has been proposed that explores the combination of genetic algorithms with static analysis, and a code replacement method to address the problem of XSS at the source code level. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An optimal mesh algorithm for remote protein homology detection by M. Abdullah, Firdaus, M. Othman, Razib, Kasim, Shahreen, Hashim, Rathiah, Hassan, Rohayanti, Asmuni, Hishammuddin, Taliba, Jumail

    Published 2011
    “…Remote protein homology detection is a problem of detecting evolutionary relationship between proteins at low sequence similarity level. …”
    Get full text
    Get full text
    Article
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques by Mohammad Syawaludin Syafiq, Hassan

    Published 2016
    “…In this study, a tracking algorithm is developed by means of image processing technique in detecting ambulance. …”
    Get full text
    Get full text
    Thesis
  14. 14

    The application of Hough Transform for corner detection by Jamaludin, Mohad Fuad

    Published 2006
    “…Mean while, the Zhang Suen Thinning Method can be used to reduce the edge points into minima points to speed up the algorithm. To illustrate the problem, the interface program is developed by using Microsoft Visual C++ 6.0.…”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Drone Based People Counter And Tracking Using Unique Id Using Opencv Python by Bhaskar, Hariyaran

    Published 2020
    “…The algorithm is developed so that it is capable to detect various objects by applying a bounding box on the frame image. …”
    Get full text
    Get full text
    Monograph
  17. 17
  18. 18

    Flock optimization algorithm-based deep learning model for diabetic disease detection improvement by Balasubramaniyan, Divager, Husin, Nor Azura, Mustapha, Norwati, Mohd Sharef, Nurfadhlina, Mohd Aris, Teh Noranis

    Published 2024
    “…Then flock optimization algorithm is applied to detect the sequence; this process is used to reduce the convergence and optimization problems. …”
    Get full text
    Get full text
    Article
  19. 19

    Automatic filtering of far outliers in multibeam echo sounding dataset using robust detection algorithms by Mahmud, Mohd. Razali, Mohd. Yusof, Othman

    Published 2005
    “…A remarkable result can be achieved by filtering these far outliers using automatic detection mode. This paper elaborates the techniques used for the detection and elimination of the far outliers in the MBES dataset, known as robust detection algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Detection of in-car-abandoned children via deep learning algorithm / Mohd Farhan Mohd Pauzi by Mohd Pauzi, Mohd Farhan

    Published 2022
    “…Therefore, this study aims to detect the existence of "in-car-abandoned children" using deep learning algorithm. …”
    Get full text
    Get full text
    Thesis