Search Results - (( java application testing algorithm ) OR ( using machine window algorithm ))

Refine Results
  1. 1

    Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin by Mohd Shahirudin, Syamir

    Published 2022
    “…The Windows malware dataset has been trained and tested by these three machine learning algorithms to get the percentage detection accuracy. …”
    Get full text
    Get full text
    Student Project
  2. 2
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    SLIDING WINDOW TRAINING ALGORITHMS USING MLP-NETWORK FOR CORRELATED AND LOST PACKET DATA by AHMED IZZELDIN, HUZAIFA TAWFEIG

    Published 2012
    “…The research work also investigates several recursive algorithms including recursive Kalman filter (RKF) and extended Kalman filter (EKF) using extreme learning machine (ELM) and hybrid linear/nonlinear training technique by incorporating the fiee derivative concept. …”
    Get full text
    Get full text
    Thesis
  5. 5

    VMware as an Intermediate Platform between Windows 7 and Linux Fedora 15 for Real-Time Malaysian Sign Language Translator by Bilal, Sara Mohammed Osman Saleh, Nassr, Rasheed, Akmeliawati, Rini

    Published 2014
    “…The developed method is based on HTK, Gt2k under LINUX Fedora 16 and VC++ 2010 and OpenCV pre 1.1 library under Windows7. The communication between client (Windows7) and server (LINUX Fedora 16) has been established using VMware. …”
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.] by Mohd Fuzi, Mohd Faris, Mohd Shahirudin, Syamir, Abd Halim, Iman Hazwam, Jamaluddin, Muhammad Nabil Fikri

    Published 2023
    “…To improve the detection accuracy for future research, it is suggested that the malware dataset be enhanced using several architectures, such as Linux and Android, and use additional supervised and unsupervised machine learning algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    VMware as an intermediate platform between Windows 7 and Linux Fedora 15 for real-time Malaysian sign language translator by Bilal, Sara Mohammed Osman Saleh, Nassr, Rasheed M., Akmeliawati, Rini

    Published 2014
    “…The developed method is based on HTK, Gt2k under LINUX Fedora 16 and VC++ 2010 and OpenCV pre 1.1 library under Windows7. The communication between client (Windows7) and server (LINUX Fedora 16) has been established using VMware. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Destination prediction based on past movement history by Waheed, Mihsaan

    Published 2020
    “…In this paper we explore destination prediction using the past movement history, where the history is built using machine learning. …”
    Get full text
    Thesis
  9. 9

    ALC cleaning device / Nur Liyana Sujak … [et al.] by Sujak, Nur Liyana, Azizan, Nur Azfarah, Rasid, Nur Amira, Yaacob, Hidayati Mardhiah, Borhan, Atikah

    Published 2017
    “…Compared to the current cleaner machine, this product has rapid cleaning action since it uses laser as the cleaning device. …”
    Get full text
    Get full text
    Entrepreneurship Project
  10. 10

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  11. 11

    The impact of news sentiment on the stock market fluctuation : the case of selected energy sector by Ling, Wu, Siew, Hock Ow

    Published 2021
    “…We developed a financial news sentiment classifier by combining machine learning algorithms and lexicon-based labelling methods. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Epileptic Seizure Detection Using Singular Values And Classical Features Of EEG Signals by Ahmed, Ahmed Elsayed Elmahdy

    Published 2014
    “…In this algorithm a sliding window of one second is utilized to check for epileptic seizure at each second and the classification method used is support vector machine (SVM). …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Using streaming data algorithm for intrusion detection on the vehicular controller area network by Sharmin, Shaila, Mansor, Hafizah, Abdul Kadir, Andi Fitriah, Abdul Aziz, Normaziah

    Published 2022
    “…This has prompted researchers to develop statistical and machine learning based intrusion detection systems for the CAN bus that use various features such as message timing and frequency to detect attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh by Kuldeep Kaur , Ragbir Singh

    Published 2019
    “…Standard base machine learning algorithms, which include a total of twelve individual methods as well as the AdaBoost and Bagging methods, are firstly used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Optimised Crossover Genetic Algorithms for Combinatorial Optimisation Problems by Nazif, Habibeh

    Published 2010
    “…We particularly focus on four problems: single machine family scheduling problem with maximum lateness, single machine family scheduling problem with total weighted completion time, capacitated vehicle routing problem and vehicle routing problem with time windows. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Stock price prediction using machine learning: evidence from Pakistan stock exchange by Raza, Hassan

    Published 2024
    “…The model is trained using a sliding window approach and is evaluated using precision, recall, and F1-score metrics. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Adaptive medium access control protocol of Wifi-Halow for home machine-to-machine network by Liew, Jiun Terng

    Published 2019
    “…IEEE 802.11ah is a Wi-Fi standard designed to support the Internet of Things (IoT) and Machine-to-machine (M2M) concept. While showing positive promises, the lack of clarity on the implementation is hindering the network from reaching its full potential. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers