Search Results - (( java application using algorithm ) OR ( source detection learning algorithm ))
Search alternatives:
- detection learning »
- learning algorithm »
- java application »
- source detection »
- using algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023“…This study presents the comparison of three Machine Learning algorithms for the detection using cyberbullying activity on social media platforms specifically Twitter. …”
Get full text
Get full text
Undergraduates Project Papers -
5
-
6
Development of vehicle detection and counting system for traffic analysis using computer vision
Published 2024“…Once the trained weights are ready a deep learning algorithm detection model is applied to detect and draw a bounding box on the vehicles. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
Published 2019“…This study uses machine learning method to detect anomalies in system log files. …”
Get full text
Get full text
Get full text
Thesis -
8
Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review
Published 2024“…The use of social media, as well as computational tools and machine learning algorithm, contributes to current public health efforts to detect any indicators of depression from sources close to patients. � 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.…”
Conference Paper -
9
Covid-19 Fake News Detection Model On Social Media Data Using Machine Learning Techniques
Published 2023Get full text
Get full text
Undergraduates Project Papers -
10
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…The hyperparameter optimization achieved best performance by implementing the EHS algorithm at the system level, thereby increasing feature-detection accuracy and bridging the gap between deep learning innovation and real-world malware detection and response models. …”
thesis::doctoral thesis -
11
COVID-19 fake news detection model on social media data using machine learning techniques
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
14
A hyperbolic sarcasm detection model using negative sentiment tweets and machine learning algorithms / Vithyatheri Govindan
Published 2024“…The unbiased dataset was analyzed using three renowned machine learning algorithms, that is, Support Vector Machine, Random Forest, and Random Forest with Bagging. …”
Get full text
Get full text
Get full text
Thesis -
15
Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites
Published 2023“…Then, a machine learning tool is selected to build machine learning models that use three different machine learning algorithms, which are Support Vector Machine, Random Forest, and XGBoost. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
16
Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data
Published 2019“…The availability of high-resolution laser scanning data and advanced machine learning algorithms has enabled an accurate potential rockfall source identification. …”
Get full text
Get full text
Get full text
Article -
17
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…Four types of machine learning algorithm were tested with four different kind of splitting dataset techniques separately. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
Published 2019“…Observing network traffic flow for anomalies is a common method in Intrusion Detection. More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
