Search Results - (( java application using algorithm ) OR ( source detection learning algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset by Afiefah Hannani, Abdul Halim

    Published 2023
    “…This study presents the comparison of three Machine Learning algorithms for the detection using cyberbullying activity on social media platforms specifically Twitter. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5
  6. 6

    Development of vehicle detection and counting system for traffic analysis using computer vision by Saw, Kenny Wei Wen

    Published 2024
    “…Once the trained weights are ready a deep learning algorithm detection model is applied to detect and draw a bounding box on the vehicles. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian by Zahedeh, Zamanian

    Published 2019
    “…This study uses machine learning method to detect anomalies in system log files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review by Mat Ripah N.A., Abdul Latif A., Che Cob Z., Mohd Drus S., Md Anwar R., Mohd Radzi H.

    Published 2024
    “…The use of social media, as well as computational tools and machine learning algorithm, contributes to current public health efforts to detect any indicators of depression from sources close to patients. � 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.…”
    Conference Paper
  9. 9
  10. 10

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…The hyperparameter optimization achieved best performance by implementing the EHS algorithm at the system level, thereby increasing feature-detection accuracy and bridging the gap between deep learning innovation and real-world malware detection and response models. …”
    thesis::doctoral thesis
  11. 11
  12. 12

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    A hyperbolic sarcasm detection model using negative sentiment tweets and machine learning algorithms / Vithyatheri Govindan by Vithyatheri , Govindan

    Published 2024
    “…The unbiased dataset was analyzed using three renowned machine learning algorithms, that is, Support Vector Machine, Random Forest, and Random Forest with Bagging. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites by Liong, Kah Pong

    Published 2023
    “…Then, a machine learning tool is selected to build machine learning models that use three different machine learning algorithms, which are Support Vector Machine, Random Forest, and XGBoost. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  16. 16

    Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data by Fanos, Ali Mutar, Pradhan, Biswajeet, Mansor, Shattri, Md Yusoff, Zainuddin, Abdullah, Ahmad Fikri, Jung, Hyung Sup

    Published 2019
    “…The availability of high-resolution laser scanning data and advanced machine learning algorithms has enabled an accurate potential rockfall source identification. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…Four types of machine learning algorithm were tested with four different kind of splitting dataset techniques separately. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework by Udzir, Nur Izura, Hajamydeen, Asif Iqbal

    Published 2019
    “…Observing network traffic flow for anomalies is a common method in Intrusion Detection. More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis