Search Results - (( java implementation a algorithm ) OR ( coding machine learning algorithm ))
Search alternatives:
- java implementation »
- learning algorithm »
- implementation a »
- coding machine »
- a algorithm »
-
1
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
Get full text
Get full text
Monograph -
2
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…Several machine learning techniques based on supervised learning have been applied to classify malware. …”
Get full text
Get full text
Get full text
Article -
3
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…Several machine learning techniques based on supervised learning have been adopted in the classification of malware. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
5
-
6
Enhancement of network security by use machine learning
Published 2019“…This research is about the design and simulation on enhancement network security using machine learning. The design use MATLAB coding to show the simulation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
-
9
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
10
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
11
Predicting energy consumption pattern based on top trending videos YouTube 2021 using machine learning techniques
Published 2022“…The process of putting a machine learning pipeline into action will be explored and analysed. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
14
A new domain specific scripting language for automated machine learning pipeline
Published 2019“…From the varieties of the machine learning algorithms, selecting the best model with the best configurations is a critical and complex design issue. …”
Get full text
Get full text
Article -
15
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…By leveraging AI and machine learning, the system dynamically suggests the most suitable penetration testing tools which are Nmap, XSStrike, PwnXSS, OWASP ZAP, or Burp Suite. …”
Get full text
Get full text
Get full text
Article -
18
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Enhancement of feature sets for subjectivity analysis on Malay-English code-switching text
Published 2023“…The algorithm predicts the type of each word in a code-switching sentence according to the language of the word. …”
Get full text
Get full text
Get full text
Get full text
Thesis
