Search Results - (( developing banking classification algorithm ) OR ( java application sensor algorithm ))
Search alternatives:
- banking classification »
- developing banking »
- application sensor »
- java application »
- sensor algorithm »
-
1
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…The second one is to develop prototype for classification of credit cardholder behavior based on k Nearest Neighbors Algorithm. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
3
ios Mobile Malware Deep Analysis And Classification For Social Media And Online Banking Exploitation
Published 2024thesis::master thesis -
4
-
5
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
6
-
7
-
8
Improving hand written digit recognition using hybrid feature selection algorithm
Published 2022“…Therefore, many researchers have applied and developed various machine learning algorithms that could efficiently tackle the handwritten digit recognition problem. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
-
11
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…Factors which impact PCANet are studied to identify the limitations of PCANet. For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. …”
Get full text
Get full text
Monograph -
12
Statistical band selection for descriptors of MBSE and MFCC-based features for accent classification of Malaysian English / Yusnita M. A. ...[et al.]
Published 2013“…This paper proposes an efficient way of analyzing the ethnical accent using statistical knowledge of log-energies of fourier transformed derived mel-filter banks. A simple algorithm to select bands so called statistical band selection (SBS) method using smallest variances within class scores was developed to optimize the presentation of speech features. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Dynamic android malware category classification using semi-supervised deep learning
Published 2020“…We use dynamic analysis to craft dynamic behavior profiles as feature vectors. Furthermore, we develop a new dataset, namely CICMalDroid2020, which includes 17,341 most recent samples of five different Android apps categories: Adware, Banking, SMS, Riskware, and Benign. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…Grey Wolf Optimizer (GWO) is a recently developed meta-heuristic algorithm which is appealing to researcher owing to its demonstrated performance as cited in the scientific literature. …”
Get full text
Get full text
Thesis -
16
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…The Phishing Rule-Based algorithm is used to extract SMS Phishing. For Module 2, the SMS Attack Profiling algorithm is used in order to produce SMS Spam and Phishing words. …”
Get full text
Get full text
Get full text
Thesis
