Search Results - (( java application testing algorithm ) OR ( using machine window algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- window algorithm »
- machine »
-
1
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The Windows malware dataset has been trained and tested by these three machine learning algorithms to get the percentage detection accuracy. …”
Get full text
Get full text
Student Project -
2
Integrating finance dictionary in lexicon-based approach with machine learning algorithm to analyse the impact of OPEC news sentiment on financial market / Wu Ling
Published 2020“…The labelled sentences are then used to train the supervised machine learning classifiers. …”
Get full text
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
SLIDING WINDOW TRAINING ALGORITHMS USING MLP-NETWORK FOR CORRELATED AND LOST PACKET DATA
Published 2012“…The research work also investigates several recursive algorithms including recursive Kalman filter (RKF) and extended Kalman filter (EKF) using extreme learning machine (ELM) and hybrid linear/nonlinear training technique by incorporating the fiee derivative concept. …”
Get full text
Get full text
Thesis -
5
VMware as an Intermediate Platform between Windows 7 and Linux Fedora 15 for Real-Time Malaysian Sign Language Translator
Published 2014“…The developed method is based on HTK, Gt2k under LINUX Fedora 16 and VC++ 2010 and OpenCV pre 1.1 library under Windows7. The communication between client (Windows7) and server (LINUX Fedora 16) has been established using VMware. …”
Get full text
Get full text
Proceeding Paper -
6
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…To improve the detection accuracy for future research, it is suggested that the malware dataset be enhanced using several architectures, such as Linux and Android, and use additional supervised and unsupervised machine learning algorithms.…”
Get full text
Get full text
Get full text
Article -
7
VMware as an intermediate platform between Windows 7 and Linux Fedora 15 for real-time Malaysian sign language translator
Published 2014“…The developed method is based on HTK, Gt2k under LINUX Fedora 16 and VC++ 2010 and OpenCV pre 1.1 library under Windows7. The communication between client (Windows7) and server (LINUX Fedora 16) has been established using VMware. …”
Get full text
Get full text
Get full text
Article -
8
Destination prediction based on past movement history
Published 2020“…In this paper we explore destination prediction using the past movement history, where the history is built using machine learning. …”
Get full text
Thesis -
9
ALC cleaning device / Nur Liyana Sujak … [et al.]
Published 2017“…Compared to the current cleaner machine, this product has rapid cleaning action since it uses laser as the cleaning device. …”
Get full text
Get full text
Entrepreneurship Project -
10
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
11
The impact of news sentiment on the stock market fluctuation : the case of selected energy sector
Published 2021“…We developed a financial news sentiment classifier by combining machine learning algorithms and lexicon-based labelling methods. …”
Get full text
Get full text
Get full text
Article -
12
Epileptic Seizure Detection Using Singular Values And Classical Features Of EEG Signals
Published 2014“…In this algorithm a sliding window of one second is utilized to check for epileptic seizure at each second and the classification method used is support vector machine (SVM). …”
Get full text
Get full text
Final Year Project -
13
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…This has prompted researchers to develop statistical and machine learning based intrusion detection systems for the CAN bus that use various features such as message timing and frequency to detect attacks. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh
Published 2019“…Standard base machine learning algorithms, which include a total of twelve individual methods as well as the AdaBoost and Bagging methods, are firstly used. …”
Get full text
Get full text
Get full text
Thesis -
15
Optimised Crossover Genetic Algorithms for Combinatorial Optimisation Problems
Published 2010“…We particularly focus on four problems: single machine family scheduling problem with maximum lateness, single machine family scheduling problem with total weighted completion time, capacitated vehicle routing problem and vehicle routing problem with time windows. …”
Get full text
Get full text
Thesis -
16
Text Extraction Algorithm for Web Text Classification
Published 2010Get full text
Get full text
Get full text
Thesis -
17
Stock price prediction using machine learning: evidence from Pakistan stock exchange
Published 2024“…The model is trained using a sliding window approach and is evaluated using precision, recall, and F1-score metrics. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Adaptive medium access control protocol of Wifi-Halow for home machine-to-machine network
Published 2019“…IEEE 802.11ah is a Wi-Fi standard designed to support the Internet of Things (IoT) and Machine-to-machine (M2M) concept. While showing positive promises, the lack of clarity on the implementation is hindering the network from reaching its full potential. …”
Get full text
Get full text
Thesis -
20
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers
