Search Results - (( java application testing algorithm ) OR ( source detection learning algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset by Afiefah Hannani, Abdul Halim

    Published 2023
    “…This study presents the comparison of three Machine Learning algorithms for the detection using cyberbullying activity on social media platforms specifically Twitter. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3
  4. 4

    Development of vehicle detection and counting system for traffic analysis using computer vision by Saw, Kenny Wei Wen

    Published 2024
    “…Once the trained weights are ready a deep learning algorithm detection model is applied to detect and draw a bounding box on the vehicles. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  6. 6

    Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian by Zahedeh, Zamanian

    Published 2019
    “…This study uses machine learning method to detect anomalies in system log files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review by Mat Ripah N.A., Abdul Latif A., Che Cob Z., Mohd Drus S., Md Anwar R., Mohd Radzi H.

    Published 2024
    “…The use of social media, as well as computational tools and machine learning algorithm, contributes to current public health efforts to detect any indicators of depression from sources close to patients. � 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.…”
    Conference Paper
  8. 8
  9. 9

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…The hyperparameter optimization achieved best performance by implementing the EHS algorithm at the system level, thereby increasing feature-detection accuracy and bridging the gap between deep learning innovation and real-world malware detection and response models. …”
    thesis::doctoral thesis
  11. 11
  12. 12

    A hyperbolic sarcasm detection model using negative sentiment tweets and machine learning algorithms / Vithyatheri Govindan by Vithyatheri , Govindan

    Published 2024
    “…The unbiased dataset was analyzed using three renowned machine learning algorithms, that is, Support Vector Machine, Random Forest, and Random Forest with Bagging. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites by Liong, Kah Pong

    Published 2023
    “…Then, a machine learning tool is selected to build machine learning models that use three different machine learning algorithms, which are Support Vector Machine, Random Forest, and XGBoost. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  14. 14

    Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data by Fanos, Ali Mutar, Pradhan, Biswajeet, Mansor, Shattri, Md Yusoff, Zainuddin, Abdullah, Ahmad Fikri, Jung, Hyung Sup

    Published 2019
    “…The availability of high-resolution laser scanning data and advanced machine learning algorithms has enabled an accurate potential rockfall source identification. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…Four types of machine learning algorithm were tested with four different kind of splitting dataset techniques separately. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework by Udzir, Nur Izura, Hajamydeen, Asif Iqbal

    Published 2019
    “…Observing network traffic flow for anomalies is a common method in Intrusion Detection. More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Machine learning for APT detection by Al-Aamri, Abdullah Said Ali, Abdulghafor, Rawad Abdulkhaleq Abdulmolla, Turaev, Sherzod, Al-Shaikhli, Imad Fakhri Taha, Zeki, Akram M., Talib, Shuhaili

    Published 2023
    “…Furthermore, standardized techniques have been enhanced to enhance their effectiveness in detecting APT attacks. The learning process relies on datasets sourced from various channels, including journal logs, traceability audits, and systems monitoring statistics. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article