Search Results - (( java implementation using algorithm ) OR ( learning internet learning algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- learning algorithm »
- learning internet »
- internet learning »
- using algorithm »
-
1
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…To achieve this, we measured the performance of three deep learning algorithms for normal and abnormal detection of IDS, and a comparison was made to select the best performance of the deep learning algorithm for detection in IDS, such as RNN, DBN and CNN. …”
Get full text
Get full text
Article -
3
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
4
Development of web based learning content of animation algorithm on searching and sorting techniques / Nur Linda Abdi Nur
Published 2007“…The objectives of this project is to develop self-learning environment in learning searching and sorting algorithm, enhance understanding of student in learning searching and sorting technique and to apply web-based learning in computer science subject, which focus on courses that use searching and sorting algorithm.…”
Get full text
Get full text
Thesis -
5
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
6
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
7
Phishing attack detection using machine learning method
Published 2019“…This spam message includes the email and the SMS message that received by the user. There are several algorithms that can be used in the machine learning method to prevent the both attacks. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
8
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
9
Review of the machine learning methods in the classification of phishing attack
Published 2019“…There are several algorithms that can be used in the machine learning method to prevent these attacks. …”
Get full text
Get full text
Get full text
Article -
10
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
Published 2020“…The results demonstrate the efficiency of deep learning algorithms when detecting attacks from the transport layer. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Machine learning classification model for identifying internet addiction among university students
Published 2023“…Nonetheless, there are some issues associated with the questionnaire regarding the integrity and literacy of the participants as well as the experience of the specialist which might introduce inconsistencies in the assessment of one's Internet addiction level. Hence, the machine learning algorithm is introduced to replace the conventional assessment method for Internet addiction. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…The obtained data can be subjected to extensive preprocessing and feature extraction tasks before being learned using appropriate machine learning or deep learning algorithms to generate a model capable of managing human activities more effectively. …”
Get full text
Get full text
Article -
13
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
14
Machine learning and deep learning approaches for cybersecurity: a review
Published 2022“…This paper reviewed intrusion detection systems and discussed what types of learning algorithms machine learning and deep learning are using to protect data from malicious behavior. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Architecture for latency reduction in healthcare internet-of-things using reinforcement learning and fuzzy based fog computing
Published 2019“…This hybrid approach integrates healthcare IoT devices with the cloud and uses fog services with Fuzzy Reinforcement Learning Data Packet Allocation (FRLDPA) algorithm. …”
Get full text
Get full text
Article -
16
Architecture for latency reduction in healthcare internet-of-things using reinforcement learning and fuzzy based fog computing
Published 2019“…This hybrid approach integrates healthcare IoT devices with the cloud and uses fog services with Fuzzy Reinforcement Learning Data Packet Allocation (FRLDPA) algorithm. …”
Get full text
Get full text
Article -
17
Performances of machine learning algorithms for binary classification of network anomaly detection system
Published 2018“…The aim of this paper to build a network anomaly detection system using machine learning algorithms that are efficient, effective and fast processing. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
19
A Chaotic Teaching Learning Based Optimization Algorithm for Optimization Emergency Flood Evacuation Routing
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Slangs And Short Forms Of Malay Twitter Sentiment Analysis Using Supervised Machine Learning
Published 2021“…This paper is to determine which of the algorithms chosen in supervised machine learning with higher accuracy in detecting internet slang and short forms. …”
Get full text
Get full text
Get full text
Article
