Search Results - (( programming validity detection algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- programming validity »
- validity detection »
- data normalization »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Article -
6
-
7
-
8
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Article -
9
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
Get full text
Get full text
Conference or Workshop Item -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
11
Lettuce Leaf Disease Detection Using Convolutional Neural Network Algorithm
Published 2023“…The detection algorithm will be develop based on a modified AlexNet model. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
-
13
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
15
Ischemic Stroke Detection System With Computer Aided Diagnostic Capability
Published 2017“…Since the evaluation requires human experts, limited number of experts makes the manual emboli detection a challenging task. Therefore, this project is to develop program for automated emboli detection. …”
Get full text
Get full text
Monograph -
16
Vision Based Multi Sensor Feedback System For Robot System With Intelligent
Published 2009“…Finally, a set of experiments to validate the proposed algorithms has been conducted. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
A Preemptive behaviour-based malware detection through analysis of API calls sequence inspired by Human Immune System
Published 2024journal::journal article -
18
Optimize single line to ground fault detection in distribution grid power system using artificial bee colony
Published 2023“…This paper discusses Texas instrument fault current detection and MATLAB validation. It improves system reliability, device protection, and copper savings by thousands of tons. …”
Get full text
Get full text
Get full text
Article -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
20
Prediction of novel doping agent using an in silico model that integrates chemical, biological and phenotypic data
Published 2016“…These models were validated using five-fold cross validation to evaluate their predictive power. …”
Get full text
Get full text
Student Project
