Search Results - (( java application using algorithm ) OR ( using machine window algorithm ))
Search alternatives:
- java application »
- window algorithm »
- using algorithm »
- machine »
-
1
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The Windows malware dataset has been trained and tested by these three machine learning algorithms to get the percentage detection accuracy. …”
Get full text
Get full text
Student Project -
2
Integrating finance dictionary in lexicon-based approach with machine learning algorithm to analyse the impact of OPEC news sentiment on financial market / Wu Ling
Published 2020“…The labelled sentences are then used to train the supervised machine learning classifiers. …”
Get full text
Get full text
Get full text
Thesis -
3
SLIDING WINDOW TRAINING ALGORITHMS USING MLP-NETWORK FOR CORRELATED AND LOST PACKET DATA
Published 2012“…The research work also investigates several recursive algorithms including recursive Kalman filter (RKF) and extended Kalman filter (EKF) using extreme learning machine (ELM) and hybrid linear/nonlinear training technique by incorporating the fiee derivative concept. …”
Get full text
Get full text
Thesis -
4
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
5
VMware as an Intermediate Platform between Windows 7 and Linux Fedora 15 for Real-Time Malaysian Sign Language Translator
Published 2014“…The developed method is based on HTK, Gt2k under LINUX Fedora 16 and VC++ 2010 and OpenCV pre 1.1 library under Windows7. The communication between client (Windows7) and server (LINUX Fedora 16) has been established using VMware. …”
Get full text
Get full text
Proceeding Paper -
6
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…To improve the detection accuracy for future research, it is suggested that the malware dataset be enhanced using several architectures, such as Linux and Android, and use additional supervised and unsupervised machine learning algorithms.…”
Get full text
Get full text
Get full text
Article -
7
-
8
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
9
VMware as an intermediate platform between Windows 7 and Linux Fedora 15 for real-time Malaysian sign language translator
Published 2014“…The developed method is based on HTK, Gt2k under LINUX Fedora 16 and VC++ 2010 and OpenCV pre 1.1 library under Windows7. The communication between client (Windows7) and server (LINUX Fedora 16) has been established using VMware. …”
Get full text
Get full text
Get full text
Article -
10
Destination prediction based on past movement history
Published 2020“…In this paper we explore destination prediction using the past movement history, where the history is built using machine learning. …”
Get full text
Thesis -
11
ALC cleaning device / Nur Liyana Sujak … [et al.]
Published 2017“…Compared to the current cleaner machine, this product has rapid cleaning action since it uses laser as the cleaning device. …”
Get full text
Get full text
Entrepreneurship Project -
12
The impact of news sentiment on the stock market fluctuation : the case of selected energy sector
Published 2021“…We developed a financial news sentiment classifier by combining machine learning algorithms and lexicon-based labelling methods. …”
Get full text
Get full text
Get full text
Article -
13
Epileptic Seizure Detection Using Singular Values And Classical Features Of EEG Signals
Published 2014“…In this algorithm a sliding window of one second is utilized to check for epileptic seizure at each second and the classification method used is support vector machine (SVM). …”
Get full text
Get full text
Final Year Project -
14
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…This has prompted researchers to develop statistical and machine learning based intrusion detection systems for the CAN bus that use various features such as message timing and frequency to detect attacks. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh
Published 2019“…Standard base machine learning algorithms, which include a total of twelve individual methods as well as the AdaBoost and Bagging methods, are firstly used. …”
Get full text
Get full text
Get full text
Thesis -
16
Optimised Crossover Genetic Algorithms for Combinatorial Optimisation Problems
Published 2010“…We particularly focus on four problems: single machine family scheduling problem with maximum lateness, single machine family scheduling problem with total weighted completion time, capacitated vehicle routing problem and vehicle routing problem with time windows. …”
Get full text
Get full text
Thesis -
17
Text Extraction Algorithm for Web Text Classification
Published 2010Get full text
Get full text
Get full text
Thesis -
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Stock price prediction using machine learning: evidence from Pakistan stock exchange
Published 2024“…The model is trained using a sliding window approach and is evaluated using precision, recall, and F1-score metrics. …”
Get full text
Get full text
Conference or Workshop Item
