Search Results - (( developing ineffective program algorithm ) OR ( java application force algorithm ))
Search alternatives:
- developing ineffective »
- application force »
- java application »
- force algorithm »
-
1
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
2
-
3
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
Get full text
Get full text
Get full text
Article -
4
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The integrated classifier algorithm applied to examine, classify and generate rules of the pattern and program behaviour of system call information. …”
Get full text
Get full text
Get full text
Article -
5
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
6
Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad...
Published 2019“…In this study, Chaotic Immune Symbiotic Organisms Search (CISOS) optimisation technique was developed with the aim of enhancing the searching capability of Symbiotic Organisms Search (SOS) technique to produce higher quality solutions. …”
Get full text
Get full text
Thesis -
7
Personal mobile-health application
Published 2025“…In order to create a secure, scalable, and highly user interactive that enables users to efficiently manage their general health, the solution will be created in an Agile environment using tools like TensorFlow Lite, Firebase, and Kotlin as the primary of programming language in this development.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
