Search Results - (( java application optimized algorithm ) OR ( user detection learning algorithm ))
Search alternatives:
- optimized algorithm »
- detection learning »
- learning algorithm »
- java application »
- user detection »
-
1
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
Get full text
Get full text
Student Project -
2
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…The dyslexia handwriting detection prototype demonstrates how machine learning may improve the detect handwriting issues in educational settings. …”
Get full text
Get full text
Thesis -
3
Applying learning to filter text
Published 2005“…The use of probabilistic approaches such as naïve Bayes algorithm is the effective algorithms currently known for learning to filter or classify text document.Naïve Bayes algorithm is one of the algorithms in Machine Learning that manipulates probability estimation or reasoning about the observed data.The growing of bulk e-mail or known as spam e-mail becomes a threat to users’ privacy and network load and in the case of e -mail filtering,naïve Bayes classifier can be trained to automatically detect spam messages.Similar to the e-mail, forum application may be misused by the user to send bad messages and in some extent may offence other readers.Forum filtering may be less important compared to e-mail spam filtering; however there is a possibility of using naïve Bayes to learn the messages and automatically detect bad messages.Most of the forum application found in the web is applying keyword based text filtering which scan the words and change the detected words into certain representation.Instead of defining a set of keywords to filter the forum messages, this paper will explains the experiment in applying a learning to filter text especially in the educational and anonymous forum message, where there is no user registration required to submit messages.…”
Get full text
Get full text
Conference or Workshop Item -
4
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
6
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
7
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
8
Bot detection using machine learning algorithms on social media platforms
Published 2021“…Also, It will improve the level of privacy and authenticity of these platforms and related users. The research uses the bot detection technique based on machine learning algorithms. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023“…This study presents the comparison of three Machine Learning algorithms for the detection using cyberbullying activity on social media platforms specifically Twitter. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
11
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
Get full text
Get full text
Thesis -
12
A wheelchair sitting posture detection system using pressure sensors
Published 2024“…A graphical-user interface (GUI) based application was developed using the algorithm with the highest accuracy, DT classifier, to illustrate the result of the posture classification to the wheelchair user for any posture correction to be made in case of improper sitting posture detected.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
14
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
15
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023“…Aside from that, the objective of this project is to investigate cryptojacking in cryptocurrency users' devices, develop a machine learning model to detect cryptojacking, and evaluate the machine learning model's accuracy, true positive rate (TPR), false positive rate (FPR), and precision in detecting cryptojacking. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…Subsequently, the security alert mechanism is formulated by integrating with the detection algorithm to alert Twitter users. The overall result significantly indicates that a novel security alert framework using dynamic tweet-based features for phishing detection on Twitter has been formulated. …”
Get full text
Get full text
Thesis -
17
Fast Corner Detection in Augmented Reality Learning Management of the Corpse
Published 2021“…The application also meets 82.8% of the user side's usability level, which indicates that this application is beneficial for learning. …”
Get full text
Get full text
Get full text
Journal -
18
-
19
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
20
Home intruder detection system using machine learning and IoT
Published 2022Get full text
Get full text
Get full text
Article
