Search Results - (( based computer ((user algorithm) OR (tree algorithm)) ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- based computer »
- user algorithm »
- tree algorithm »
-
1
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
2
-
3
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023Get full text
Get full text
Undergraduates Project Papers -
4
-
5
-
6
Window based personalized time management system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
7
-
8
Phishing attack detection using machine learning method
Published 2019“…The development of computer networks today is increased rapidly. This can be shown based on the trend of every computer user around the world, whereby they need to connect their computer to the Internet. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
9
-
10
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. This study is carried out through the utilisation of two machine learning techniques, namely Decision Tree and Naive Bayes, on Jupyter Notebook in order to conduct an analysis of the Keylogger Detection dataset obtained from a trustworthy website known as Kaggle. …”
Get full text
Get full text
Student Project -
11
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…This research algorithm demonstrated a very promising result with Support Vector Machines, this algorithm produces a 90% of accuracies whereas the decision tree algorithm gets 100% accuracies. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Sentiment Analysis of Cyberbullying in Social Media Using Decision Trees
Published 2020Get full text
Get full text
Final Year Project -
13
Scalable rekeying algorithm in IEEE 802.16e
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…This paper presents the tuning of PID controller for single-input single-output (SISO) and multiple-input multiple-output (MIMO) control systems using tree physiology optimization (TPO). TPO is a metaheuristic algorithm inspired from a plant growth system derived based on the idea of plant architecture and Thornley model (TM). …”
Get full text
Get full text
Article -
17
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…This paper presents the tuning of PID controller for single-input single-output (SISO) and multiple-input multiple-output (MIMO) control systems using tree physiology optimization (TPO). TPO is a metaheuristic algorithm inspired from a plant growth system derived based on the idea of plant architecture and Thornley model (TM). …”
Get full text
Get full text
Article -
18
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
19
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
20
Prime-based method for interactive mining of frequent patterns
Published 2010Get full text
Get full text
Thesis
