Search Results - (( developing users prevention algorithm ) OR ( java code classification algorithm ))

Refine Results
  1. 1

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  2. 2

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4
  5. 5

    Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…Most of the existing location cloaking algorithms are only concerned with snapshot user locations and cannot effectively prevent users from location-dependent attacks when user location-contexts are continuously updated. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…Most of the existing location cloaking algorithms are only concerned with snapshot user locations and cannot effectively prevent users from location-dependent attacks when user location-contexts are continuously updated. …”
    Get full text
    Get full text
    Article
  7. 7

    CleverSecure ONLINE System by Ab. Kadir, Shamimi

    Published 2008
    “…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Library reservation system using face detection / Nik Ruslawati Nik Mustapa and Nur Athikah Fatehah Rosli by Nik Mustapa, Nik Ruslawati, Rosli, Nur Athikah Fatehah

    Published 2022
    “…The room needs to be reserved beforehand for the user to use. This situation has become a problem for users as the user’s desired room may be occupied by other users. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network by Al-Mayouf, Y.R.B., Ismail, M., Abdullah, N.F., Wahab, A.W.A., Mahdi, O.A., Khan, S., Choo, R.K.K.

    Published 2016
    “…Therefore, this paper proposes a novel routing algorithm called efficient and stable routing algorithm based on user mobility and node density (ESRA-MD). …”
    Get full text
    Get full text
    Article
  10. 10

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A wheelchair sitting posture detection system using pressure sensors by Mohamad Yusoff, Muhammad Annuar Alhadi, Azmi, Nur Liyana, Nordin, Nor Hidayati Diyana

    Published 2024
    “…A graphical-user interface (GUI) based application was developed using the algorithm with the highest accuracy, DT classifier, to illustrate the result of the posture classification to the wheelchair user for any posture correction to be made in case of improper sitting posture detected.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks by Salman, Emad Hmood

    Published 2018
    “…Next, we developed a Constant Global False Alarm Rate (CGFAR) with Constant Global Detection Rate (CGDR) algorithm to mitigate the Cooperative SS (CSS) requirements. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) by Shuwandy, Moceheb Lazam

    Published 2012
    “…Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Stress mental health symptom assessment mobile application for young adults by Lee, Chun Hoong

    Published 2023
    “…Before this stage, the KNN algorithm is employed to construct the model using Google Form response data as part of the application development process. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Clustering the addiction levels of drug users using fuzzy c-mean by Okfalisa, Okfalisa, Suliandri, Pramulia, Alwesabi, Ola A., Tassuov, Bolat, Saule, Raimbayeva, Kurdyukov, Vitaliy, Zulkifli, Zahidah, Handayani, Lestari

    Published 2025
    “…Hence, the rehabilitation associations in Riau province as end-user of this case are aided in identifying the addiction level of drug users in order to ensure the proper therapeutic prevention and curative action…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Suspicious activity trigger system using YOLOv6 convolutional neural network by Suryanti, Awang, Mohd Qhairel, Rafiqi Rokei, Sulaiman, Junaida

    Published 2023
    “…If the activity is classified as the suspicious activity, the system will automatically display a trigger message to alert SATS user. The user can therefore take whatever appropriate measure to prevent being a victim. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…In addition, the objective is to tighten the security of Windows platform by implementing a new way of encrypting users' information to prevent access by unauthorized users. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Beat: heart monitoring system by Shamsolnizam, Afif Fanshuri, Basri, Iskandar Zulkarnain, Zakaria, Noor Azura, Tajuddin, Taniza, Suryady, Zeldi

    Published 2022
    “…Beat application is a simple, accurate, and low-cost system that uses a smartwatch to detect heart rate and analyze the data on the user's smartphones. Machine learning algorithms were also developed by our team to detect abnormalities in heart rate. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Monitoring the Quality of Ozone towards the Prevention of Further Global Warming by Abas, M. Amir, Azim, M.Khusairy, Fadzil, M.Helmi, M.Dahlui, UniKL BMI

    Published 2013
    “…The instrument comprises of two main blocks; the data logger and Graphic User Interface (GUI). The data logger uses 16-Bit Microcontroller as the main control board housing data logger algorithm, Solar Tracker algorithm and data storage block. …”