Search Results - (( programming users detection algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- data normalization »
- programming users »
- users detection »
- java »
-
1
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
2
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
Get full text
Get full text
Monograph -
3
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
Get full text
Get full text
Thesis -
4
-
5
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
6
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
Get full text
Get full text
Conference or Workshop Item -
7
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
Get full text
Get full text
Thesis -
8
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
9
Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli
Published 2018Get full text
Get full text
Student Project -
10
Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan
Published 2023“…The project follows a modified waterfall approach, focusing on creating a user-friendly interface and integrating the Random Forest Classification Algorithm for accurate detection. …”
Get full text
Get full text
Thesis -
11
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
12
Experimental implementation of dynamic spectrum access for video transmission using USRP
Published 2012“…The cognitive radio users are also programmed to operate independently without interfering with each other using energy detection algorithm for spectrum sensing. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
-
14
-
15
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Future development can be carried out by creating a database based on the user’s standard of measure and accessing it whenever the user starts the program.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
17
Electroencephalogram signal interpretation system for mobile robot
Published 2013“…Using sample datasets, the EEG signal is analyzed to determine the most suitable scalp area for P300 detection, while optimization with genetic algorithm (GA) is developed to select best four channels. …”
Get full text
Get full text
Thesis -
18
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…The password system is also recommended as a viable solution for this authentication as its implementation is most convenient for mobile users. A password algorithm is proposed from which a program can be written in any language deemed suitable.…”
Get full text
Get full text
Thesis -
19
-
20
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item
