Search Results - (( developing online commitment algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1
  2. 2

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3
  4. 4

    Video traffic analysis on Unifi broadband network / Laina Sofia Mahamad by Mahamad, Laina Sofia

    Published 2017
    “…Thirdly, to identify best traffic model based on fitted model in developing network traffic bandwidth control algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Skype multimedia application traffic analysis on home Unifi network / Siti Fatimah Ramle by Ramle, Siti Fatimah

    Published 2017
    “…This study is significant in developing a dynamic committed access rate algorithms line which would benefits the broadband network users.…”
    Get full text
    Get full text
    Thesis