Search Results - (( programming terms detection algorithm ) OR ( java data function algorithm ))
Search alternatives:
- function algorithm »
- programming terms »
- terms detection »
- data function »
- java »
-
1
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
2
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…Moreover, native programming platform is faster than Java programming with 75.91% better in terms of execution time on average. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Fault detection with optimum March Test Algorithm
Published 2012“…Therefore to improve fault detection, an automation program is developed based on sequence operation (SQ) generation rules. …”
Get full text
Conference or Workshop Item -
6
-
7
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
Get full text
Get full text
Thesis -
8
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…We measure the performances of our prioritization approach using Average Percentage of rate of Faults Detection (APFD) metric. This proposed approach will increase the efficiency and effectiveness of regression testing in term of rate of fault detection. …”
Get full text
Get full text
Conference or Workshop Item -
9
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
11
The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases
Published 2015“…Design-based regression testing approaches have been proposed to address changes at higher levels of abstraction, these approaches may not detect changes in the method body and several of the code based addresses procedural programs. …”
Get full text
Get full text
Get full text
Article -
12
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
13
Leveraging Web Scraping in Predictive Modelling of Supply Risk Detection
Published 2022“…The significance of the extracted output is evaluated with the topic modelling algorithm (LDA model algorithm) for the purpose of predictive supply risk. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
15
Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli
Published 2018Get full text
Get full text
Student Project -
16
-
17
Fish disease detection using Convolutional Neural Network (CNN) / Nur Adriana Qaisara Azahar
Published 2024“…Traditional approaches frequently depend on visual inspection without any tools which can be difficult in terms of precision and productivity. This study presents a fish detection system that uses Convolutional Neural Networks (CNNs) and advanced image processing techniques, with a flexible research approach directing the iterative development process. …”
Get full text
Get full text
Thesis -
18
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
19
Tracking student performance in introductory programming by means of machine learning
Published 2023Conference Paper -
20
NON-VERBAL HUMAN-ROBOT INTERACTION USING NEURAL NETWORK FOR THE APPLICATION OF SERVICE ROBOT
Published 2023“…In particular. nonverbal HRI plays an important role in social interactions, which highlights the need to accurately detect the subject's attention by evaluating the programmed cues. …”
Get full text
Get full text
Article
