Search Results - (( java implementation phase algorithm ) OR ( user computing machine algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- machine algorithm »
- phase algorithm »
- user computing »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Phishing attack detection using machine learning method
Published 2019“…This is because some of the computer users do not install security system in their computer. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
Estimating Depressive Tendencies Of Twitter User Via Social Media Data
Published 2023Get full text
Get full text
Undergraduates Project Papers -
4
Review of the machine learning methods in the classification of phishing attack
Published 2019“…However, in widely using this computer network, the privacy of computer users is in danger, especially for computer users who do not install security systems in their computer. …”
Get full text
Get full text
Get full text
Article -
5
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023Get full text
Get full text
Undergraduates Project Papers -
6
Extreme learning machine for user location prediction in mobile environment
Published 2011“…This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. This study is carried out through the utilisation of two machine learning techniques, namely Decision Tree and Naive Bayes, on Jupyter Notebook in order to conduct an analysis of the Keylogger Detection dataset obtained from a trustworthy website known as Kaggle. …”
Get full text
Get full text
Student Project -
8
Automatic email classification system / Phang Siew Ting
Published 2003Get full text
Get full text
Thesis -
9
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…In virtualization, a physical server changes into the virtual machine (VM) and acts as a physical server. Due to the large number of users sometimes the task sent by the user to cloud causes the VM to be under loaded or overloaded. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Music Recommender System Using Machine Learning Content-Based Filtering Technique
Published 2022Get full text
Get full text
Undergraduates Project Papers -
11
A power saver scheduling algorithm using DVFS and DNS techniques in cloud computing data centres
Published 2023“…Cloud computing; Costs; Dynamic frequency scaling; Electric power utilization; Energy efficiency; Energy utilization; Infrastructure as a service (IaaS); Network security; Quality of service; User interfaces; Virtual machine; Voltage scaling; Cloud computing environments; Data centres; DVFS; Dynamic voltage frequency scaling; Energy-Efficient Scheduling; Low energy consumption; Reduce energy consumption; Task-scheduling algorithms; Green computing…”
Article -
12
ROA-CONS: raccoon optimization job scheduling
Published 2021“…An optimised schedule results in greater efficiency of the parallel machine. In addition, processes and network heterogeneity is another difficulty for the scheduling algorithm. …”
Get full text
Get full text
Article -
13
Extreme learning machine for user location prediction in mobile environment
Published 2011“…This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim
Published 2017Subjects: Get full text
Get full text
Thesis -
15
Predicting Mental Health Disorder On Twitter Using Machine Learning Techniques
Published 2022Get full text
Get full text
Undergraduates Project Papers -
16
-
17
-
18
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…This has led to a great migration of users to cloud computing from other modes of computing. …”
Get full text
Get full text
Thesis -
19
Study of machine learning in computer vision using Raspberry Pi
Published 2024text::Final Year Project -
20
