Search Results - (( java implementation among algorithm ) OR ( user computing machine algorithm ))
Search alternatives:
- implementation among »
- java implementation »
- machine algorithm »
- among algorithm »
- user computing »
-
1
Network monopoly / Tan Kean Yeap
Published 2002“…Accordingly, the pressure from the users of these systems for ways to communicate among all these machines is irresistible. …”
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
Phishing attack detection using machine learning method
Published 2019“…This is because some of the computer users do not install security system in their computer. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
Estimating Depressive Tendencies Of Twitter User Via Social Media Data
Published 2023Get full text
Get full text
Undergraduates Project Papers -
5
Review of the machine learning methods in the classification of phishing attack
Published 2019“…However, in widely using this computer network, the privacy of computer users is in danger, especially for computer users who do not install security systems in their computer. …”
Get full text
Get full text
Get full text
Article -
6
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
7
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023Get full text
Get full text
Undergraduates Project Papers -
8
Extreme learning machine for user location prediction in mobile environment
Published 2011“…This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. This study is carried out through the utilisation of two machine learning techniques, namely Decision Tree and Naive Bayes, on Jupyter Notebook in order to conduct an analysis of the Keylogger Detection dataset obtained from a trustworthy website known as Kaggle. …”
Get full text
Get full text
Student Project -
10
Automatic email classification system / Phang Siew Ting
Published 2003Get full text
Get full text
Thesis -
11
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…In virtualization, a physical server changes into the virtual machine (VM) and acts as a physical server. Due to the large number of users sometimes the task sent by the user to cloud causes the VM to be under loaded or overloaded. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Music Recommender System Using Machine Learning Content-Based Filtering Technique
Published 2022Get full text
Get full text
Undergraduates Project Papers -
13
A power saver scheduling algorithm using DVFS and DNS techniques in cloud computing data centres
Published 2023“…Cloud computing; Costs; Dynamic frequency scaling; Electric power utilization; Energy efficiency; Energy utilization; Infrastructure as a service (IaaS); Network security; Quality of service; User interfaces; Virtual machine; Voltage scaling; Cloud computing environments; Data centres; DVFS; Dynamic voltage frequency scaling; Energy-Efficient Scheduling; Low energy consumption; Reduce energy consumption; Task-scheduling algorithms; Green computing…”
Article -
14
ROA-CONS: raccoon optimization job scheduling
Published 2021“…An optimised schedule results in greater efficiency of the parallel machine. In addition, processes and network heterogeneity is another difficulty for the scheduling algorithm. …”
Get full text
Get full text
Article -
15
Extreme learning machine for user location prediction in mobile environment
Published 2011“…This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim
Published 2017Subjects: Get full text
Get full text
Thesis -
17
Predicting Mental Health Disorder On Twitter Using Machine Learning Techniques
Published 2022Get full text
Get full text
Undergraduates Project Papers -
18
-
19
-
20
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…This has led to a great migration of users to cloud computing from other modes of computing. …”
Get full text
Get full text
Thesis
