Search Results - (( code application ((svm algorithm) OR (_ algorithm)) ) OR ( java application using algorithm ))
Search alternatives:
- code application »
- java application »
- using algorithm »
- svm algorithm »
-
1
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
2
-
3
-
4
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
5
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Prediction of COVID-19 outbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman
Published 2024“…This research significantly contributes to the understanding of machine learning applications in the context of COVID-19 outbreak prediction, emphasizing the importance of algorithm and configuration selections for robust forecasting. …”
Get full text
Get full text
Thesis -
7
-
8
Improving hand written digit recognition using hybrid feature selection algorithm
Published 2022“…In the field of machine learning, handwritten digit recognition was known as one of the crucial problems for pattern recognition and computer vision applications. There were a few applications of handwritten digit recognition, which include recognizing the digits on a utility map, zip code on a postal mail, identifying bank check amount processing and many more. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
Get full text
Get full text
Thesis -
10
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
11
-
12
Biometrics electronic purse
Published 1999“…A 56-bit DES encryption algorithm can easily be broken in just 2 to 3 days using the EFF DES CRACKER, an unclassified ASIC machine. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Classifying good and bad websites
Published 2015“…This project illustrates that it is possible to classify websites as good or bad by using the underlying tags along with the machine learning algorithms.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
Classroom finder system with student availability, space and time constraint
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. An application called ‘AndroSensor’ on a smartphone, that retrieves real-time data from accelerometer, gyroscope and gravity sensors, is used as the input signals. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Cross-project software defect prediction
Published 2022“…Through this work, it was discovered the majority of the selected studies used machine learning techniques as classification algorithms, and 64% of the studies used the combination of Object-Oriented (OO) and Line of Code (LOC) metrics. …”
Get full text
Get full text
Article -
17
-
18
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Recent industrial solutions to overcome the problem includes using manual registration, using 125kHz proximity card, using mobile application to scan QR code and others. …”
Get full text
Get full text
Get full text
Academic Exercise -
19
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Today, most web applications are vulnerable to SQL-injection attacks. …”
Get full text
Get full text
Get full text
Article -
20
